Sample records for identifying vulnerable equipment

The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...

Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...

activates the postulated consumer financial vulnerability index (CFVI) .... words, the relationship between income, consumption, debt and saving as well as .... separation/divorce and bad financial management, as well as exogenous factors.

Two ongoing programs at Los Alamos, the Vital Area Analysis Program and the Reactor Sabotage Vulnerability Program, are discussed. The Laboratory has been providing the Nuclear Regulatory Commission with technical support in identifying the vital areas at nuclear power plants through the use of sabotage fault trees. This procedure is being expanded to provide support for the Reactor Sabotage Vulnerability Assessment Program. A re-examination of some of the original system modeling assumptions, including a survey of the applicable research, is underway. A description of the survey work and the computerized data bases being used is provided. This program is expected to result in refinements in the existing procedures

This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with

This review puts into questions the possible role of cognitive vulnerability markers in prediction and prevention of schizophrenia. Until recently, none of the identified cognitive anomalies has been proved to be definitive. However, as new promising candidates are emerging (DS-CPT, CPT-IP, P suppression, Saccadic Eye Movements), the predictive value of these trait-type anomalies may be criticized regarding four issues, which are discussed: technical, metrological, theoretical, and clinical. As things stand, the existence of a cognitive vulnerability marker, which testify to a permanent pathological trait, does not constitute a sufficient factor to identify and treat subjects who are at risk for schizophrenia. Copyright 2002 Wiley-Liss, Inc.

We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

The rupture of arterial plaques is the most common cause of ischemic complications including stroke, the fourth leading cause of death and number one cause of long term disability in the United States. Unfortunately, because conventional diagnostic tools fail to identify plaques that confer the highest risk, often a disabling stroke and/or sudden death is the first sign of disease. A diagnostic method capable of characterizing plaque vulnerability would likely enhance the predictive ability and ultimately the treatment of stroke before the onset of clinical events. This dissertation evaluates the hypothesis that Acoustic Radiation Force Impulse (ARFI) imaging can noninvasively identify lipid regions, that have been shown to increase a plaque's propensity to rupture, within carotid artery plaques in vivo. The work detailed herein describes development efforts and results from simulations and experiments that were performed to evaluate this hypothesis. To first demonstrate feasibility and evaluate potential safety concerns, finite- element method simulations are used to model the response of carotid artery plaques to an acoustic radiation force excitation. Lipid pool visualization is shown to vary as a function of lipid pool geometry and stiffness. A comparison of the resulting Von Mises stresses indicates that stresses induced by an ARFI excitation are three orders of magnitude lower than those induced by blood pressure. This thesis also presents the development of a novel pulse inversion harmonic tracking method to reduce clutter-imposed errors in ultrasound-based tissue displacement estimates. This method is validated in phantoms and was found to reduce bias and jitter displacement errors for a marked improvement in image quality in vivo. Lastly, this dissertation presents results from a preliminary in vivo study that compares ARFI imaging derived plaque stiffness with spatially registered composition determined by a Magnetic Resonance Imaging (MRI) gold standard

Full Text Available Abstract: INTRODUCTION Currently, dengue fever, chikungunya fever, and zika virus represent serious public health issues in Brazil, despite efforts to control the vector, the Aedes aegypti mosquito. METHODS: This was a descriptive and ecological study of dengue deaths occurring from 2002 to 2013 in São Luis, Maranhão, Brazil. Geoprocessing software was used to draw maps, linking the geo-referenced deaths with urban/social data at census tract level. RESULTS: There were 74 deaths, concentrated in areas of social vulnerability. CONCLUSIONS: The use of geo-technology tools pointed to a concentration of dengue deaths in specific intra-urban areas.

Currently, dengue fever, chikungunya fever, and zika virus represent serious public health issues in Brazil, despite efforts to control the vector, the Aedes aegypti mosquito. This was a descriptive and ecological study of dengue deaths occurring from 2002 to 2013 in São Luis, Maranhão, Brazil. Geoprocessing software was used to draw maps, linking the geo-referenced deaths with urban/social data at census tract level. There were 74 deaths, concentrated in areas of social vulnerability. The use of geo-technology tools pointed to a concentration of dengue deaths in specific intra-urban areas.

The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

The Human Factors Analysis and Classification System for Healthcare (HFACS-Healthcare) was used to classify surgical near miss events reported via a hospital's event reporting system over the course of 1 year. Two trained analysts identified causal factors within each event narrative and subsequently categorized the events using HFACS-Healthcare. Of 910 original events, 592 could be analyzed further using HFACS-Healthcare, resulting in the identification of 726 causal factors. Most issues (n = 436, 60.00%) involved preconditions for unsafe acts, followed by unsafe acts (n = 257, 35.39%), organizational influences (n = 27, 3.72%), and supervisory factors (n = 6, 0.82%). These findings go beyond the traditional methods of trending incident data that typically focus on documenting the frequency of their occurrence. Analyzing near misses based on their underlying contributing human factors affords a greater opportunity to develop process improvements to reduce reoccurrence and better provide patient safety approaches.

This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to

Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at

Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

The high-level contribution of this paper is to illustrate the development of generic solution strategies to remove software security vulnerabilities that could be identified using automated tools for source code analysis on software programs (developed in Java). We use the Source Code Analyzer and Audit Workbench automated tools, developed by HP Fortify Inc., for our testing purposes. We present case studies involving a file writer program embedded with features for password validation, and ...

Differential exposure to multiple environmental burdens and benefits and their distribution across a population with varying vulnerability can contribute heavily to health inequalities. Particularly relevant are areas with high cumulative burdens and high social vulnerability termed as “hotspots”. This paper develops an index-based approach to assess these multiple burdens and benefits in combination with vulnerability factors at detailed intra-urban level. The method is applied to the city of Dortmund, Germany. Using non-spatial and spatial methods we assessed inequalities and identified “hotspot” areas in the city. We found modest inequalities burdening higher vulnerable groups in Dortmund (CI = −0.020 at p vulnerability, is essential to inform environmental justice debates and to mobilize local stakeholders. Locating “hotspot” areas at this detailed spatial level can serve as a basis to develop interventions that target vulnerable groups to ensure a health conducive equal environment. PMID:27409625

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Full Text Available The main purpose of this study is to propose a methodology for identifyingvulnerable regions in the Cameron Highlands that are susceptible to soil loss, based on runoff aggregation structure and the energy expenditure pattern of the natural river basin, within the framework of power law distribution. To this end, three geomorphologic factors, namely shear stress and stream power, as well as the drainage area of every point in the basin of interest, have been extracted using GIS, and then their complementary cumulative distributions are graphically analyzed by fitting them to power law distribution, with the purpose of identifying the sensitive points within the basin that are susceptible to soil loss with respect to scaling regimes of shear stress and stream power. It is observed that the range of vulnerable regions by the scaling regime of shear stress is much narrower than by the scaling regime of stream power. This result seems to suggest that shear stress is a scale-dependent factor, which does not follow power law distribution and does not adequately reflect the energy expenditure pattern of a river basin. Therefore, stream power is preferred as a more reasonable factor for the evaluation of soil loss. The methodology proposed in this study can be validated by visualizing the path of soil loss, which is generated from the hillslope process (characterized by the local slope to the valley through a fluvial process (characterized by the drainage area as well as the local slope.

Until expensive engineering solutions become more universally available, the objective targeting of resources at demonstrably effective, low-cost interventions might help reverse the trend of increasing mortality in earthquakes. Death tolls in earthquakes are the result of complex interactions between physical effects, such as the exposure of the population to strong shaking, and the resilience of the exposed population along with supporting critical infrastructures and institutions. The identification of socio-economic factors that contribute to earthquake mortality is crucial to identifying and developing successful risk management strategies. Here we develop a quantitative methodology more objectively to assess the ability of communities to withstand earthquake shaking, focusing on, in particular, those cases where risk management performance appears to exceed or fall below expectations based on economic status. Using only published estimates of the shaking intensity and population exposure for each earthquake, data that is available for earthquakes in countries irrespective of their level of economic development, we develop a model for mortality based on the contribution of population exposure to shaking only. This represents an attempt to remove, as far as possible, the physical causes of mortality from our analysis (where we consider earthquake engineering to reduce building collapse among the socio-economic influences). The systematic part of the variance with respect to this model can therefore be expected to be dominated by socio-economic factors. We find, as expected, that this purely physical analysis partitions countries in terms of basic socio-economic measures, for example GDP, focusing analytical attention on the power of economic measures to explain variance in observed distributions of earthquake risk. The model allows the definition of a vulnerability index which, although broadly it demonstrates the expected income-dependence of vulnerability to

T- and NK-cell lymphomas (TCL) are a heterogenous group of lymphoid malignancies with poor prognosis. In contrast to B-cell and myeloid malignancies, there are few preclinical models of TCLs, which has hampered the development of effective therapeutics. Here we establish and characterize preclinical models of TCL. We identify multiple vulnerabilities that are targetable with currently available agents (e.g., inhibitors of JAK2 or IKZF1) and demonstrate proof-of-principle for biomarker-driven therapies using patient-derived xenografts (PDXs). We show that MDM2 and MDMX are targetable vulnerabilities within TP53-wild-type TCLs. ALRN-6924, a stapled peptide that blocks interactions between p53 and both MDM2 and MDMX has potent in vitro activity and superior in vivo activity across 8 different PDX models compared to the standard-of-care agent romidepsin. ALRN-6924 induced a complete remission in a patient with TP53-wild-type angioimmunoblastic T-cell lymphoma, demonstrating the potential for rapid translation of discoveries from subtype-specific preclinical models.

Cape Canaveral, Florida, is a prominent feature along the Southeast U.S. coastline. The region includes Merritt Island National Wildlife Refuge, Cape Canaveral Air Force Station, NASA’s Kennedy Space Center, and a large portion of Canaveral National Seashore. The actual promontory of the modern Cape falls within the jurisdictional boundaries of Cape Canaveral Air Force Station. Erosion hazards result from winter and tropical storms, changes in sand resources, sediment budgets, and sea-level rise. Previous work by the USGS has focused on the vulnerability of the dunes to storms, where updated bathymetry and topography have been used for modeling efforts. Existing research indicates that submerged shoals, ridges, and sandbars affect patterns of wave refraction and height, coastal currents, and control sediment transport. These seabed anomalies indicate the availability and movement of sand within the nearshore environment, which may be directly related to the stability of the Cape Canaveral shoreline. Understanding the complex dynamics of the offshore bathymetry and associated sediment pathways can help identify current and future erosion vulnerabilities due to short-term (for example, hurricane and other extreme storms) and long-term (for example, sea-level rise) hazards.

-SSL patterns of activity in a large proportion of PTEN-deficient breast cancer cell lines and are potential specific vulnerabilities in PTEN-deficient breast cancer. Furthermore, the NUAK1 PTEN-SSL vulnerabilityidentified by RNA interference techniques can be recapitulated and exploited using the small molecule kinase inhibitor HTH-01-015. Thus, NUAK1 inhibition may be an effective strategy for precision treatment of PTEN-deficient breast tumors.

Full Text Available The United Nations General Assembly Resolution 61/105, concerning sustainable fisheries in the marine ecosystem, calls for the protection of vulnerable marine ecosystems (VME from destructive fishing practices. Subsequently, the Food and Agriculture Organization (FAO produced guidelines for identification of VME indicator species/taxa to assist in the implementation of the resolution, but recommended the development of case-specific operational definitions for their application. We applied kernel density estimation (KDE to research vessel trawl survey data from inside the fishing footprint of the Northwest Atlantic Fisheries Organization (NAFO Regulatory Area in the high seas of the northwest Atlantic to create biomass density surfaces for four VME indicator taxa: large-sized sponges, sea pens, small and large gorgonian corals. These VME indicator taxa were identified previously by NAFO using the fragility, life history characteristics and structural complexity criteria presented by FAO, along with an evaluation of their recovery trajectories. KDE, a non-parametric neighbour-based smoothing function, has been used previously in ecology to identify hotspots, that is, areas of relatively high biomass/abundance. We present a novel approach of examining relative changes in area under polygons created from encircling successive biomass categories on the KDE surface to identify "significant concentrations" of biomass, which we equate to VMEs. This allows identification of the VMEs from the broader distribution of the species in the study area. We provide independent assessments of the VMEs so identified using underwater images, benthic sampling with other gear types (dredges, cores, and/or published species distribution models of probability of occurrence, as available. For each VME indicator taxon we provide a brief review of their ecological function which will be important in future assessments of significant adverse impact on these habitats here

Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species’ biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world’s birds, amphibians and corals (16,857 species). The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle) for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608–851 bird (6–9%), 670–933 amphibian (11–15%), and 47–73 coral species (6–9%) are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability

The extreme heat days not only make cities less comfortable for living but also they are associated with increased morbidity and mortality. Mapping studies have demonstrated spatial variability in heat vulnerability. A study conducted between 2000 and 2011 in New York City shows that deaths during heat waves was more likely to occur in black individuals, at home in census tracts which received greater public assistance. This map project intends to portray areas in San Jose California that are vulnerable to extreme heat events. The variables considered to build a vulnerability index are: land surface temperature, vegetated areas (NDVI), and people exposed to these area (population density).

... and internal control weaknesses at executive branch agencies. These vulnerabilities and internal control weaknesses include those that could compromise homeland security, affect public safety, or have a financial impact on taxpayer's dollars...

.... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

Full Text Available Sound and noise are as old as humanity itself. They have accompanied civilization, evolution, and development for centuries. Music and speech represent not only the key elements of human life but also unpleasant feelings of noise that have always been an integral part of human existence. As industrial development has required more energy, powerful machinery, and equipment, there have been still noisier machines. Traffic has grown quickly due to the number and speed of vehicles. For that reason, an acoustic camera is used for the dynamic visualization of machinery and equipment noise as it analyses the sources of noise in details. Subsequently, qualified measures are introduced based on the results of the analysis. The paper considers launching another application. According to the proposed methodology, its use in identifying machinery and equipment failures and their maintenance is proved. The experiment was performed on a four-wheel lawn mower. The primary focus was on the identification of failures using an acoustic camera. The previous method allowed to quickly, precisely and efficiently identifying the failures in two out of five tested machines.

This paper discusses a method for rapidly and systematically identifyingvulnerableequipment in a nuclear material or similar production process and ranking that equipment according to its attractiveness to a malevolent attacker. A multistep approach was used in the analysis. First, the entire production cycle was modeled as a flow diagram. This flow diagram was analyzed using graph theoretical methods to identify processes in the production cycle and their locations. Models of processes that were judged to be particularly vulnerable based on the cycle analysis then were developed in greater detail to identifyequipment in that process that is vulnerable to intentional damage

Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

Full Text Available Personally identifiable information (PII affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

Current and future breeding ranges of 15 bird and 16 reptile species were modeled in the Southwestern United States. Rather than taking a broad-scale, vulnerability-assessment approach, we created a species distribution model (SDM) for each focal species incorporating climatic, landscape, and plant variables. Baseline climate (1940–2009) was characterized with Parameter-elevation Regressions on Independent Slopes Model (PRISM) data and future climate with global-circulation-model data under an A1B emission scenario. Climatic variables included monthly and seasonal temperature and precipitation; landscape variables included terrain ruggedness, soil type, and insolation; and plant variables included trees and shrubs commonly associated with a focal species. Not all species-distribution models contained a plant, but if they did, we included a built-in annual migration rate for more accurate plant-range projections in 2039 or 2099. We conducted a group meta-analysis to (1) determine how influential each variable class was when averaged across all species distribution models (birds or reptiles), and (2) identify the correlation among contemporary (2009) habitat fragmentation and biological attributes and future range projections (2039 or 2099). Projected changes in bird and reptile ranges varied widely among species, with one-third of the ranges predicted to expand and two-thirds predicted to contract. A group meta-analysis indicated that climatic variables were the most influential variable class when averaged across all models for both groups, followed by landscape and plant variables (birds), or plant and landscape variables (reptiles), respectively. The second part of the meta-analysis indicated that numerous contemporary habitat-fragmentation (for example, patch isolation) and biological-attribute (for example, clutch size, longevity) variables were significantly correlated with the magnitude of projected range changes for birds and reptiles. Patch isolation was

We assessed the vulnerability of the native Mediterranean pond turtle to encroachment by the invasive red-eared slider in southern Spain. We first obtained an ecogeographical favourability model for the Mediterranean pond turtle. We then modelled the presence/absence of the red-eared slider in the Mediterranean pond turtle range and obtained an encroachment favourability model. We also obtained a favourability model for the red-eared slider using the ecogeographical favourability for the Medi...

The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.

Hypoxic-ischemic and traumatic brain injuries are leading causes of long-term mortality and disability in infants and children. Although several preclinical models using rodents of different ages have been developed, species differences in the timing of key brain maturation events can render comparisons of vulnerability and regenerative capacities difficult to interpret. Traditional models of developmental brain injury have utilized rodents at postnatal day 7–10 as being roughly equivalent to a term human infant, based historically on the measurement of post-mortem brain weights during the 1970s. Here we will examine fundamental brain development processes that occur in both rodents and humans, to delineate a comparable time course of postnatal brain development across species. We consider the timing of neurogenesis, synaptogenesis, gliogenesis, oligodendrocyte maturation and age-dependent behaviors that coincide with developmentally regulated molecular and biochemical changes. In general, while the time scale is considerably different, the sequence of key events in brain maturation is largely consistent between humans and rodents. Further, there are distinct parallels in regional vulnerability as well as functional consequences in response to brain injuries. With a focus on developmental hypoxicischemic encephalopathy and traumatic brain injury, this review offers guidelines for researchers when considering the most appropriate rodent age for the developmental stage or process of interest to approximate human brain development. PMID:23583307

The lack of effective chemotherapies for high-grade serous ovarian cancers (HGS-OvCa) has motivated a search for alternative treatment strategies. Here, we present an unbiased systems-approach to interrogate a panel of 14 well-annotated HGS-OvCa patient-derived xenografts for sensitivity to PI3K and PI3K/mTOR inhibitors and uncover cell death vulnerabilities. Proteomic analysis reveals that PI3K/mTOR inhibition in HGS-OvCa patient-derived xenografts induces both pro-apoptotic and anti-apoptotic signaling responses that limit cell killing, but also primes cells for inhibitors of anti-apoptotic proteins. In-depth quantitative analysis of BCL-2 family proteins and other apoptotic regulators, together with computational modeling and selective anti-apoptotic protein inhibitors, uncovers new mechanistic details about apoptotic regulators that are predictive of drug sensitivity (BIM, caspase-3, BCL-X L ) and resistance (MCL-1, XIAP). Our systems-approach presents a strategy for systematic analysis of the mechanisms that limit effective tumor cell killing and the identification of apoptotic vulnerabilities to overcome drug resistance in ovarian and other cancers.High-grade serous ovarian cancers (HGS-OvCa) frequently develop chemotherapy resistance. Here, the authors through a systematic analysis of proteomic and drug response data of 14 HGS-OvCa PDXs demonstrate that targeting apoptosis regulators can improve response of these tumors to inhibitors of the PI3K/mTOR pathway.

Ewing's sarcoma is a pediatric cancer of the bone that is characterized by the expression of the chimeric transcription factor EWS-FLI1 that confers a highly malignant phenotype and results from the chromosomal translocation t(11;22)(q24;q12). Poor overall survival and pronounced long-term side effects associated with traditional chemotherapy necessitate the development of novel, targeted, therapeutic strategies. We therefore conducted a focused viability screen with 200 small molecule kinase inhibitors in 2 different Ewing's sarcoma cell lines. This resulted in the identification of several potential molecular intervention points. Most notably, tozasertib (VX-680, MK-0457) displayed unique nanomolar efficacy, which extended to other cell lines, but was specific for Ewing's sarcoma. Furthermore, tozasertib showed strong synergies with the chemotherapeutic drugs etoposide and doxorubicin, the current standard agents for Ewing's sarcoma. To identify the relevant targets underlying the specific vulnerability toward tozasertib, we determined its cellular target profile by chemical proteomics. We identified 20 known and unknown serine/threonine and tyrosine protein kinase targets. Additional target deconvolution and functional validation by RNAi showed simultaneous inhibition of Aurora kinases A and B to be responsible for the observed tozasertib sensitivity, thereby revealing a new mechanism for targeting Ewing's sarcoma. We further corroborated our cellular observations with xenograft mouse models. In summary, the multilayered chemical biology approach presented here identified a specific vulnerability of Ewing's sarcoma to concomitant inhibition of Aurora kinases A and B by tozasertib and danusertib, which has the potential to become a new therapeutic option.

It is commonly agreed that active safety will have a significant impact on reducing accident figures for pedestrians and probably also bicyclists. However, chances and limitations for active safety systems have only been derived based on accident data and the current state of the art, based on proprietary simulation models. The objective of this article is to investigate these chances and limitations by developing an open simulation model. This article introduces a simulation model, incorporating accident kinematics, driving dynamics, driver reaction times, pedestrian dynamics, performance parameters of different autonomous emergency braking (AEB) generations, as well as legal and logical limitations. The level of detail for available pedestrian accident data is limited. Relevant variables, especially timing of the pedestrian appearance and the pedestrian's moving speed, are estimated using assumptions. The model in this article uses the fact that a pedestrian and a vehicle in an accident must have been in the same spot at the same time and defines the impact position as a relevant accident parameter, which is usually available from accident data. The calculations done within the model identify the possible timing available for braking by an AEB system as well as the possible speed reduction for different accident scenarios as well as for different system configurations. The simulation model identifies the lateral impact position of the pedestrian as a significant parameter for system performance, and the system layout is designed to brake when the accident becomes unavoidable by the vehicle driver. Scenarios with a pedestrian running from behind an obstruction are the most demanding scenarios and will very likely never be avoidable for all vehicle speeds due to physical limits. Scenarios with an unobstructed person walking will very likely be treatable for a wide speed range for next generation AEB systems.

With the continued spread of the zika virus in the United States in both Florida and Virginia, increased public awareness, prevention and targeted prediction is necessary to effectively mitigate further infection and propagation of the virus throughout the human population. The goal of this project is to utilize publicly accessible data and HPC resources coupled with machine learning algorithms to identify potential threat vectors for the spread of the zika virus in Texas, the United States and globally by correlating available zika case data collected from incident reports in medical databases (e.g., CDC, Florida Department of Health) with known bodies of water in various earth science databases (e.g., USGS NAQWA Data, NASA ASTER Data, TWDB Data) and by using known mosquito population centers as a proxy for trends in population distribution (e.g., WHO, European CDC, Texas Data) while correlating historical trends in the spread of other mosquito borne diseases (e.g., chikungunya, malaria, dengue, yellow fever, west nile, etc.). The resulting analysis should refine the identification of the specific threat vectors for the spread of the virus which will correspondingly increase the effectiveness of the limited resources allocated towards combating the disease through better strategic implementation of defense measures. The minimal outcome of this research is a better understanding of the factors involved in the spread of the zika virus, with the greater potential to save additional lives through more effective resource utilization and public outreach.

Conservation efforts for threatened or endangered species are challenging because the multi-scale factors that relate to their decline or inhibit their recovery are often unknown. To further exacerbate matters, the perceptions associated with the mechanisms of species decline are often viewed myopically rather than across the entire species range. We used over 80 years of fish presence data collected from the Great Plains and associated ecoregions of the United States, to investigate the relative influence of changing environmental factors on the historic and current truncated distributions of the Arkansas River shiner Notropis girardi. Arkansas River shiner represent a threatened reproductive ecotype considered especially well adapted to the harsh environmental extremes of the Great Plains. Historic (n = 163 records) and current (n = 47 records) species distribution models were constructed using a vector-based approach in MaxEnt by splitting the available data at a time when Arkansas River shiner dramatically declined. Discharge and stream order were significant predictors in both models; however, the shape of the relationship between the predictors and species presence varied between time periods. Drift distance (river fragment length available for ichthyoplankton downstream drift before meeting a barrier) was a more important predictor in the current model and indicated river segments 375–780 km had the highest probability of species presence. Performance for the historic and current models was high (area under the curve; AUC > 0.95); however, forecasting and backcasting to alternative time periods suggested less predictive power. Our results identify fragments that could be considered refuges for endemic plains fish species and we highlight significant environmental factors (e.g., discharge) that could be manipulated to aid recovery.

Full Text Available The paper presents the method of identifying the most vulnerable territories under exogenous processes caused by aridification/humidification. It is based on the assumption that some forms and types of relief increase resistance of terrestrial ecosystems to external influences, while other kinds of relief make them vulnerable. The relationship between landscape and moistening (ground and climatic is of great importance to plains which have groundwater close to the surface. We have used morphometric analysis to divide the territory into hydromorphic and automorphic landscapes. Hydromorphic territories are those that are affected by additional surface moistening and groundwater, while automorphic landscapes are less dependent on groundwater under normal atmospheric moisture. The territory is ranked according to the degree of vulnerability by expert evaluation method. The developed approach is based entirely on using GIS software (ArcGIS 10.2.1 and processing the DEM SRTM. As a result, two models of vulnerability of natural terrestrial ecosystems to exogenic processes on Baraba Plain (Western Siberia have been created for both aridification and humidification cases. The opportunity to estimate the vulnerability is the novel feature for these models of terrestrial ecosystems, in both regional and local scales. The results obtained confirm the existing ideas about the discrete mosaic character of changes in spatial landscape patterns in the area under consideration. For the southern part of Western Siberia where farming is risky the assessment of the potential degree of vulnerability for ecosystems under conditions of increasing climate aridity and extremes is relevant.

Full Text Available Rupture of an atherosclerotic plaque is the primary cause of acute cardiovascular and cerebrovascular syndromes. Early and non-invasive detection of vulnerable atherosclerotic plaques (VP would be significant in preventing some aspects of these syndromes. As a new contrast agent, dimercaptosuccinic acid (DMSA modified ultra-small super paramagnetic iron oxide (USPIO was synthesized and used to identify VP and rupture plaque by magnetic resonance imaging (MRI.Atherosclerosis was induced in male New Zealand White rabbits by feeding a high cholesterol diet (n = 30. Group A with atherosclerosis plaque (n = 10 were controls. VP was established in groups B (n = 10 and C (n = 10 using balloon-induced endothelial injury of the abdominal aorta. Adenovirus-carrying p53 genes were injected into the aortic segments rich in plaques after 8 weeks. Group C was treated with atorvastatin for 8 weeks. Sixteen weeks later, all rabbits underwent pharmacological triggering, and imaging were taken daily for 5 d after DMSA-USPIO infusion. At the first day and before being killed, serum MMP-9, sCD40L, and other lipid indicators were measured.DMSA-USPIO particles accumulated in VP and rupture plaques. Rupture plaques appeared as areas of hyper-intensity on DMSA-USPIO enhanced MRI, especially T2*-weighted sequences, with a signal strength peaking at 96 h. The group given atorvastatin showed few DMSA-USPIO particles and had lower levels of serum indicators. MMP-9 and sCD40L levels in group B were significantly higher than in the other 2 groups (P <0.05.After successfully establishing a VP model in rabbits, DMSA-USPIO was used to enhance MRI for clear identification of plaque inflammation and rupture. Rupture plaques were detectable in this way probably due to an activating inflammatory process. Atorvastatin reduced the inflammatory response and stabilizing VP possibly by decreasing MMP-9 and sCD40L levels.

Background Rupture of an atherosclerotic plaque is the primary cause of acute cardiovascular and cerebrovascular syndromes. Early and non-invasive detection of vulnerable atherosclerotic plaques (VP) would be significant in preventing some aspects of these syndromes. As a new contrast agent, dimercaptosuccinic acid (DMSA) modified ultra-small super paramagnetic iron oxide (USPIO) was synthesized and used to identify VP and rupture plaque by magnetic resonance imaging (MRI). Methods Atherosclerosis was induced in male New Zealand White rabbits by feeding a high cholesterol diet (n = 30). Group A with atherosclerosis plaque (n = 10) were controls. VP was established in groups B (n = 10) and C (n = 10) using balloon-induced endothelial injury of the abdominal aorta. Adenovirus-carrying p53 genes were injected into the aortic segments rich in plaques after 8 weeks. Group C was treated with atorvastatin for 8 weeks. Sixteen weeks later, all rabbits underwent pharmacological triggering, and imaging were taken daily for 5 d after DMSA-USPIO infusion. At the first day and before being killed, serum MMP-9, sCD40L, and other lipid indicators were measured. Results DMSA-USPIO particles accumulated in VP and rupture plaques. Rupture plaques appeared as areas of hyper-intensity on DMSA-USPIO enhanced MRI, especially T2*-weighted sequences, with a signal strength peaking at 96 h. The group given atorvastatin showed few DMSA-USPIO particles and had lower levels of serum indicators. MMP-9 and sCD40L levels in group B were significantly higher than in the other 2 groups (P MRI for clear identification of plaque inflammation and rupture. Rupture plaques were detectable in this way probably due to an activating inflammatory process. Atorvastatin reduced the inflammatory response and stabilizing VP possibly by decreasing MMP-9 and sCD40L levels. PMID:25973795

greatest climate change risk to water supply. Identifying the key climate vulnerability will inform effective adaptation and water management policies, which may include increasing the watersheds capacity to capture and divert wet season precipitation. It will also inform future research, which may involve age dating water, developing local adaptation plans, and improving climate and streamflow monitoring.

Full Text Available For an energy-efficient future, the EU needs to step up its efforts to maximize energy savings. In this context, the paper addresses the steps needed to establish energy efficiency measures and proposes effective measures to reduce consumption by recovering large amounts of energy lost to industrial consumers. The points with the highest recoverable energy potential have been identified and it is proposed to install the heat recovery systems on the flue gas exhaust circuits and polluted air from Industrial Technological Equipment (ITE such as dyeing/drying cabins (DDC. Therefore, whenever possible and as small as energy saving, energy recovery solutions at any level, but especially at local level, need to be applied. In conclusion, by concentrating all the energy-saving efforts that are still being wasted, Europe can contribute, by saving energy, to ensuring a sustainable energy future

Vulnerable plaques have thin fibrous caps overlying large necrotic lipid cores. Recent studies have shown that high-resolution MR imaging can identify these components. We set out to determine whether in vivo high-resolution MRI could quantify this aspect of the vulnerable plaque. Forty consecutive patients scheduled for carotid endarterectomy underwent pre-operative in vivo multi-sequence MR imaging of the carotid artery. Individual plaque constituents were characterised on MR images. Fibrous-cap and lipid-core thickness was measured on MRI and histology images. Bland-Altman plots were generated to determine the level of agreement between the two methods. Multi-sequence MRI identified 133 corresponding MR and histology slices. Plaque calcification or haemorrhage was seen in 47 of these slices. MR and histology derived fibrous cap-lipid-core thickness ratios showed strong agreement with a mean difference between MR and histology ratios of 0.02 (±0.04). The intra-class correlation coefficient between two readers for measurements was 0.87 (95% confidence interval, 0.73 and 0.93). Multi-sequence, high-resolution MR imaging accurately quantified the relative thickness of fibrous-cap and lipid-core components of carotid atheromatous plaques. This may prove to be a useful tool to characterise vulnerable plaques in vivo. (orig.)

Vulnerable plaques have thin fibrous caps overlying large necrotic lipid cores. Recent studies have shown that high-resolution MR imaging can identify these components. We set out to determine whether in vivo high-resolution MRI could quantify this aspect of the vulnerable plaque. Forty consecutive patients scheduled for carotid endarterectomy underwent pre-operative in vivo multi-sequence MR imaging of the carotid artery. Individual plaque constituents were characterised on MR images. Fibrous-cap and lipid-core thickness was measured on MRI and histology images. Bland-Altman plots were generated to determine the level of agreement between the two methods. Multi-sequence MRI identified 133 corresponding MR and histology slices. Plaque calcification or haemorrhage was seen in 47 of these slices. MR and histology derived fibrous cap-lipid-core thickness ratios showed strong agreement with a mean difference between MR and histology ratios of 0.02 ({+-}0.04). The intra-class correlation coefficient between two readers for measurements was 0.87 (95% confidence interval, 0.73 and 0.93). Multi-sequence, high-resolution MR imaging accurately quantified the relative thickness of fibrous-cap and lipid-core components of carotid atheromatous plaques. This may prove to be a useful tool to characterise vulnerable plaques in vivo. (orig.)

This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...

The prevalence of heat-related cardiorespiratory symptoms among vulnerable groups is not well known. We therefore estimated the prevalence of heat-related cardiorespiratory symptoms among the Finnish population and their associations with social and individual vulnerability factors. The data came from the National FINRISK 2007 Study, in which 4007 men and women aged 25-74 answered questions on heat-related cardiorespiratory symptoms in the Oulu Cold and Heat Questionnaire 2007. Logistic regression was used to calculate odds ratios (ORs), their 95 % confidence intervals (CIs), and model-predicted prevalence figures. The prevalence of heat-related cardiorespiratory symptoms was 12 %. It increased with age, from 3 % at the age of 25 years to 28 % at the age of 75 years. The symptoms were associated with pre-existing lung (OR 3.93; CI 3.01-5.13) and cardiovascular diseases (OR 2.27; 1.78-2.89); being a pensioner (OR 2.91; 1.65-5.28), unemployed (OR 2.82; 1.47-5.48), or working in agriculture (OR 2.27; 1.14-4.46) compared with working in industry; having only basic vs academic education (OR 1.98; 1.31-3.05); being female (OR 1.94; 1.51-2.50); being heavy vs light alcohol consumer (OR 1.89; 1.02-3.32); undertaking hard vs light physical work (OR 1.48;1.06-2.07); and being inactive vs active in leisure time (OR 1.97; 1.39-2.81). The adjusted prevalence of symptoms showed a wide range of variation, from 3 to 61 % depending on sex, age, professional field, education, and pre-existing lung and cardiovascular diseases. In conclusion, heat-related cardiorespiratory symptoms are commonly perceived among people with pre-existing lung or cardiovascular disease, agricultural workers, unemployed, pensioners, and people having only basic education. This information is needed for any planning and targeting measures to reduce the burden of summer heat.

Schizophrenia is a disorder of cognitive neurodevelopment with characteristic abnormalities in working memory attributed, at least in part, to alterations in the circuitry of the dorsolateral prefrontal cortex. Various environmental exposures from conception through adolescence increase risk for the illness, possibly by altering the developmental trajectories of prefrontal cortical circuits. Macaque monkeys provide an excellent model system for studying the maturation of prefrontal cortical circuits. Here, we review the development of glutamatergic and γ-aminobutyric acid (GABA)-ergic circuits in macaque monkey prefrontal cortex and discuss how these trajectories may help to identify sensitive periods during which environmental exposures, such as those associated with increased risk for schizophrenia, might lead to the types of abnormalities in prefrontal cortical function present in schizophrenia. PMID:21505116

To understand early dental erosion induced by different beverages and the equipment for its detection. The study was conducted at the University Malaya Medical Centre, Kuala Lumpur, Malaysia, from June to September 2014, and comprised single-rooted, unpolished teeth divided into six groups. Electron micrographs and other baseline readings for further analyses were taken before and after the exposure to different beverages. The teeth were exposed to the beverages using a modified Nordini's artificial mouth model. The positioning of the teeth on the motorised stage of the equipment was standardised. Of the several beverages used, CocaCola had the lowest pH value of 2.53, while tap water had the highest pH of 5.4. Deionised distilled water, which was used as a reference, had a pH near to neutral /alkaline of 7.3. The fluoride content ranged between 9.38ppm in tea and 0.005ppm in orange juice. Teeth exposed to beverages with low pH and considerably high fluoride underwent slight remineralisation (roughness increase 8% from tea), while beverages with no fluoride content and low pH roughened the enamel surface (Coca Cola roughened upto 37%). Quantitative analyses of tooth erosion, micro-hardness, surface-roughness, and surface-height showed that all beverages exhibited positive erosive effect on the tooth enamel surface (pCocaCola was found to be the most erosive agent among both hot and cold beverages (37%), while coffee was more erosive among the hot beverages (29%).

The leak of processed natural gas (PNG) from October 2015 to February 2016 from the Aliso Canyon storage facility, near Los Angeles, California, was the largest single accidental release of greenhouse gases in US history. The Interagency Task Force on Natural Gas Storage Safety and California regulators recently recommended operators phase out single-point-of-failure (SPF) well designs. Here, we develop a national dataset of UGS well activity in the continental US to assess regulatory data availability and uncertainty, and to assess the prevalence of certain well design deficiencies including single-point-of-failure designs. We identified 14 138 active UGS wells associated with 317 active UGS facilities in 29 states using regulatory and company data. State-level wellbore datasets contained numerous reporting inconsistencies that limited data concatenation. We identified 2715 active UGS wells across 160 facilities that, like the failed well at Aliso Canyon, predated the storage facility, and therefore were not originally designed for gas storage. The majority (88%) of these repurposed wells are located in OH, MI, PA, NY, and WV. Repurposed wells have a median age of 74 years, and the 2694 repurposed wells constructed prior to 1979 are particularly likely to exhibit design-related deficiencies. An estimated 210 active repurposed wells were constructed before 1917—before cement zonal isolation methods were utilized. These wells are located in OH, PA, NY, and WV and represent the highest priority related to potential design deficiencies that could lead to containment loss. This national baseline assessment identifies regulatory data uncertainties, highlights a potentially widespread vulnerability of the natural gas supply chain, and can aid in prioritization and oversight for high-risk wells and facilities.

Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identifyvulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.

At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

GIS analysis of available data to identify regions in the U.S. where shallow ground water supplies are particularly vulnerable to contamination by releases of biofuels from underground storage tanks. In this slide presentation, GIS was used to perform a simple numerical and ...

Large uncertainties in streamflow projections derived from downscaled climate projections of precipitation and temperature can render such simulations of limited value for decision making in the context of water resources management. New approaches are being sought to provide decision makers with robust information in the face of such large uncertainties. We present an alternative approach that starts with the stakeholder's definition of vulnerable ranges for relevant hydrologic indicators. Then the modeled system is analyzed to assess under what conditions these thresholds are exceeded. The space of possible climates and land use combinations for a watershed is explored to isolate subspaces that lead to vulnerability, while considering model parameter uncertainty in the analysis. We implement this concept using classification and regression trees (CART) that separate the input space of climate and land use change into those combinations that lead to vulnerability and those that do not. We test our method in a Pennsylvania watershed for nine ecological and water resources related streamflow indicators for which an increase in temperature between 3°C and 6°C and change in precipitation between -17% and 19% is projected. Our approach provides several new insights, for example, we show that even small decreases in precipitation (˜5%) combined with temperature increases greater than 2.5°C can push the mean annual runoff into a slightly vulnerable regime. Using this impact and stakeholder driven strategy, we explore the decision-relevant space more fully and provide information to the decision maker even if climate change projections are ambiguous.

This report describes the methodology applied in selecting equipment in the special safety systems for equipment qualification in the CANDU 600 MW nuclear generating stations at Gentilly 2 and Point Lepreau. Included is an explanation of the selection procedure adopted and the rationale behind the criteria used in identifying the equipment. The equipment items on the list have been grouped into three priority categories as a planning aid to AECB staff for a review of the qualification status of the special safety systems

It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the

This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps c...

flood. In the case of farm activities, vulnerability mitigation consists in implementing measures which can be: physical (equipment or electric power system elevation), organizational (emergency or recovery plan) or financial (insurance). These measures aim at decreasing the total damage incurred by farmers in case of flooding. For instance, if equipment is elevated, it will not suffer direct damage such as degradation. As a consequence, equipment will be available to continue production or recovery tasks, thus, avoiding indirect damage such as delays, indebtednessâ¦ The effects of these policies on farms, in particular vulnerability mitigation cannot be appraised using current methodologies mainly because they do not consider farm as a whole and focus on direct damage at the land plot scale (loss of yield). Moreover, since vulnerability mitigation policies are quite recent, few examples of implementation exist and no feedback experience can be processed. Meanwhile, decision makers and financial actors require more justification of the efficiency of public fund by economic appraisal of the projects. On the Rhône River, decision makers asked for an economic evaluation of the program of farm vulnerability mitigation they plan to implement. This implies to identify the effects of the measures to mitigate farm vulnerability, and to classify them by comparing their efficacy (avoided damage) and their cost of implementation. In this presentation, we propose and discuss a conceptual model of vulnerability at the farm scale. The modelling, in Unified Modelling Language, enabled to represent the ties between spatial, organizational and temporal dimensions, which are central to understanding of farm vulnerability and resilience to flooding. Through this modelling, we encompass three goals: To improve the comprehension of farm vulnerability and create a framework that allow discussion with experts of different disciplines as well as with local farmers; To identify data which

This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilitiesidentified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B

Climate change is expected to alter the distributions and community composition of stream fishes in the Great Lakes region in the 21st century, in part as a result of altered hydrological systems (stream temperature, streamflow, and habitat). Resource managers need information and tools to understand where fish species and stream habitats are expected to change under future conditions. Fish sample collections and environmental variables from multiple sources across the United States Great Lakes Basin were integrated and used to develop empirical models to predict fish species occurrence under present-day climate conditions. Random Forests models were used to predict the probability of occurrence of 13 lotic fish species within each stream reach in the study area. Downscaled climate data from general circulation models were integrated with the fish species occurrence models to project fish species occurrence under future climate conditions. The 13 fish species represented three ecological guilds associated with water temperature (cold, cool, and warm), and the species were distributed in streams across the Great Lakes region. Vulnerability (loss of species) and opportunity (gain of species) scores were calculated for all stream reaches by evaluating changes in fish species occurrence from present-day to future climate conditions. The 13 fish species included 4 cold-water species, 5 cool-water species, and 4 warm-water species. Presently, the 4 cold-water species occupy from 15 percent (55,000 kilometers [km]) to 35 percent (130,000 km) of the total stream length (369,215 km) across the study area; the 5 cool-water species, from 9 percent (33,000 km) to 58 percent (215,000 km); and the 4 warm-water species, from 9 percent (33,000 km) to 38 percent (141,000 km).Fish models linked to projections from 13 downscaled climate models projected that in the mid to late 21st century (2046–65 and 2081–2100, respectively) habitats suitable for all 4 cold-water species and 4

The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

The following report was developed for the California Department of Transportation (Caltrans) to summarize a vulnerability assessment conducted for assets in Caltrans District 4. The assessment was developed to specifically identify the potential eff...

Asian American immigrant women engaged in filial caregiving are at special risk for health problems due to complex contextual factors related to immigration, cultural traditions, and role transition. This study examines the experience of two groups of immigrant Asian American women who are caring for older parents. A total of 41 women (22 Chinese American and 19 Filipino American) were interviewed in a study based on Strauss and Corbin's grounded theory methodology. The women were determined to be loyal to their traditional culture, which included strong filial values, while adapting to a new culture. Through the struggle of meeting role expectations and coping with paradox, the women mobilized personal and family resources to transform vulnerability into strength and well-being.

During the transformation from larval tadpole to juvenile frog, there are critical periods of metamorphic development and sex differentiation that may be particularly sensitive to endocrine disruption. The aim of the present study was to identify sensitive developmental periods for estrogenic endocrine disruption in the northern leopard frog (Rana pipiens) using short, targeted exposures to the synthetic estrogen, ethinylestradiol (EE2). Post-hatch tadpoles (Gosner stage 27) were exposed over five distinct periods of metamorphosis: early (stage 27-30), mid (stage 30-36), early and mid (stage 27-36), late (stage 36-42), and the entire metamorphic period (chronic; stage 27-42). For each period, animals were sampled immediately following the EE2 exposure and at metamorphic climax (stage 42). The effects of EE2 on metamorphic development and sex differentiation were assessed through measures of length, weight, developmental stage, days to metamorphosis, sex ratios and incidence of gonadal intersex. Our results show that tadpoles exposed to EE2 during mid-metamorphosis were developmentally delayed immediately following exposure and took 2 weeks longer to reach metamorphic climax. In the unexposed groups, there was low proportion (0.15) of intersex tadpoles at stage 30 and gonads appeared to be morphologically distinct (male and female) in all individuals by stage 36. Tadpoles exposed early in development displayed a strong female-biased sex ratio compared to the controls. Moreover, these effects were also seen at metamorphic climax, approximately 2-3 months after the exposure period, demonstrating that transient early life-stage exposure to estrogen can induce effects on the reproductive organs that persist into the beginning of adult life-stages.

The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,

A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

Trace or ultratrace analyses require that the HPLC equipment used, including the detector, be optimal for such determinations. HPLC detectors are discussed at length in Chapter 4; discussion here is limited to the rest of the equipment. In general, commercial equipment is adequate for trace analysis; however, as the authors approach ultratrace analysis, it becomes very important to examine the equipment thoroughly and optimize it, where possible. For this reason they will review the equipment commonly used in HPLC and discuss the optimization steps. Detectability in HPLC is influenced by two factors (1): (a) baseline noise or other interferences that lead to errors in assigning the baseline absorbance; (b) peak width. 87 refs

To successfully continue the 252Cf production and meet the needs of the customers, a comprehensive evaluation of the Building 7920 processing equipment was requested to identifyequipment critical to the operational continuity of the program.

The current upgrading of security measures at sensitive Department of Energy (DOE) facilities reflects the continuing concern over possible terrorist and other criminal acts against these facilities. Security reviews are periodically conducted at DOE facilities, deficiencies are identified, and corrective actions are recommended. While security upgrades are initiated as soon as possible, the process of securing funding and the construction or other activities necessary to complete upgrades can cause delays in correcting security vulnerabilities. Details of security weaknesses at important DOE facilities are classified in order to deny valuable information to terrorists and other malefactors

The purpose of this document is to list the Characterization equipment drawings that are classified as Essential Drawings. Essential Drawings: Are those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment (HNF 1997a). The Characterization equipment drawings identified in this report are deemed essential drawings as defined in HNF-PRO-242, Engineering Drawing Requirements (HNF 1997a). These drawings will be prepared, revised, and maintained per HNF-PRO-440, Engineering Document Change Control (HNF 1997b). All other Characterization equipment drawings not identified in this document will be considered Support drawings until the Characterization Equipment Drawing Evaluation Report is completed

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities

There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized

Much conceptual confusion exists over the concepts of vulnerability and (social) resilience, reinforced by the different paradigms (the article identifies four) and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster

This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

Full Text Available conditions exacerbates the problem. Air quality management plans identify prioritized strategies for improved air quality independent of consideration of vulnerability. A population exposure and vulnerability risk prioritization framework comprising five...

Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

A flow-chart is developed demonstrating the relation between medical and prophylactic institutions within the organizational structure of the rehabilitation system and main types of rehabilitation procedures. In order to ascertain the priority in equipping rehabilitation services with adequate hardware the special priority criterion is introduced. The highest priority is assigned to balneotherapeutic and fangotherapeutic services. Based on the operation-by-operation analysis of clinical processes related to service and performance of balneologic procedures the preliminary set of clinical devices designed for baths, basins and showers in hospitals and rehabilitation departments is defined in a generalized form.

In this paper I examine how the United States can best defend against the interruption of critical electrical energy by hostile acts, identify and examine some of the vulnerabilities to our nation's...

Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

The cryostats presented here were built from standard parts; this makes it possible to construct a great variety of apparatus at minimum cost. The liquid nitrogen and helium reservoirs were designed so as to reduce losses to a minimum, and so as to make the cryostats as autonomous as possible. The experimental enclosure which is generally placed in the lower part of the apparatus requires a separate study in every case. Furthermore, complete assemblies such as transfer rods, isolated traps and high vacuum valves, were designed with a similar regard for the economic aspects and for the need for standardization. This equipment thus satisfies a great variety of experimental needs; it is readily adaptable and the consumptions of helium and liquid nitrogen are very low. (authors) [fr

Full Text Available The global sales market is currently led by devices with the Android operating system. In 2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the Android platform. In 2017, it is estimated that 267.78 billion applications will be downloaded from Google Play. According to Qian, 90% of applications are vulnerable, despite the recommendations of rules and standards for the safe software development. This study presents a classification of vulnerabilities, indicating the vulnerability, the safety aspect defined by the Brazilian Association of Technical Standards (Associação Brasileira de Normas Técnicas - ABNT norm NBR ISO/IEC 27002 which will be violated, which lines of code generate the vulnerability and what should be done to avoid it, and the threat agent used by each of them. This classification allows the identification of possible points of vulnerability, allowing the developer to correct the identified gaps.

Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software prov...

The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally desinged to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. For example, the SAA input, which is a text-like data file, is easily readable and can provide documentation of facility safeguards and assumptions used for the analysis

It is suggested that clinical engineers take the lead in formulating evaluation processes to recommend equipment replacement. Their skill, knowledge, and experience, combined with access to equipment databases, make them a logical choice. Based on ideas from Fennigkoh's scheme, elements such as age, vendor support, accumulated maintenance cost, and function/risk were used.6 Other more subjective criteria such as cost benefits and efficacy of newer technology were not used. The element of downtime was also omitted due to the data element not being available. The resulting Periop Master Equipment List and its rationale was presented to the Perioperative Services Program Council. They deemed the criteria to be robust and provided overwhelming acceptance of the list. It was quickly put to use to estimate required capital funding, justify items already thought to need replacement, and identify high-priority ranked items for replacement. Incorporating prioritization criteria into an existing equipment database would be ideal. Some commercially available systems do have the basic elements of this. Maintaining replacement data can be labor-intensive regardless of the method used. There is usually little time to perform the tasks necessary for prioritizing equipment. However, where appropriate, a clinical engineering department might be able to conduct such an exercise as shown in the following case study.

www.sei.cmu.edu CMU/SEI-2017-SR-019 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY [Distribution Statement A: This material has been...approved for public release and unlimited distribution.] Copyright 2017 Carnegie Mellon University. All Rights Reserved. This material is based...upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of

The statistical problems of airborne carbon fibers falling onto electrical circuits were idealized and analyzed. The probability of making contact between randomly oriented finite length fibers and sets of parallel conductors with various spacings and lengths was developed theoretically. The probability of multiple fibers joining to bridge a single gap between conductors, or forming continuous networks is included. From these theoretical considerations, practical statistical analyses to assess the likelihood of causing electrical malfunctions was produced. The statistics obtained were confirmed by comparison with results of controlled experiments.

The French fire protection concept is based on a principle of three levels of defence in depth: fire prevention, fire containing and fire controlling. Fire prevention is based on arrangements which prevent the fire from starting or which make difficult for the fire to start. Fire containing is based on design measures so that the fire will have no impact on the safety of the installation. For fire controlling, equipment nad personnel are on duty in order to detect, to fight and to gain control over the fire as early as possible. The French fire protection concept gives priority to fire containing based on passive structural measures. All buildings containing safety equipment are divided into fire compartments (or fire areas) and fire cells (or fire zones). Basically, a compartment houses safety equipment belonging to one division (or train) so that the other division is always available to reach the plant safe shut down or to mitigate an accident. Because there is a large number of fire compartments and fire cells, deviations from the general principle can be observed. To this reason the RCC-I (Design and Construction Rules applicable for fire protection) requires to implement an assessment of the principle of division. This assessment is called vulnerability analysis. The vulnerability analysis is usually performed at the end of the project, before erection. It is also possible to perform a vulnerability analysis in an operating nuclear power plant in the scope of a fire safety upgrading programme. In the vulnerability analysis, the functional failure of all the equipment (except for those protected by a qualified fire barrier, designed or able to withstand the fire consequences) within the fire compartment or cell, where the fire breaks out, is postulated. The potential consequences for the plant safety are analysed

The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.

The Iraq Department of Border Enforcement is rich in personnel, but poor in equipment. An effective border control system must include detection, discrimination, decision, tracking and interdiction, capture, identification, and disposition. An equipment solution that addresses only a part of this will not succeed, likewise equipment by itself is not the answer without considering the personnel and how they would employ the equipment. The solution should take advantage of the existing in-place system and address all of the critical functions. The solutions are envisioned as being implemented in a phased manner, where Solution 1 is followed by Solution 2 and eventually by Solution 3. This allows adequate time for training and gaining operational experience for successively more complex equipment. Detailed descriptions of the components follow the solution descriptions. Solution 1 - This solution is based on changes to CONOPs, and does not have a technology component. It consists of observers at the forts and annexes, forward patrols along the swamp edge, in depth patrols approximately 10 kilometers inland from the swamp, and checkpoints on major roads. Solution 2 - This solution adds a ground sensor array to the Solution 1 system. Solution 3 - This solution is based around installing a radar/video camera system on each fort. It employs the CONOPS from Solution 1, but uses minimal ground sensors deployed only in areas with poor radar/video camera coverage (such as canals and streams shielded by vegetation), or by roads covered by radar but outside the range of the radar associated cameras. This document provides broad operational requirements for major equipment components along with sufficient operational details to allow the technical community to identify potential hardware candidates. Continuing analysis will develop quantities required and more detailed tactics, techniques, and procedures.

City and County of Durham, North Carolina — This layer summarizes the social vulnerability index for populations within each county in the United States at scales 1:3m and below. It answers the question...

OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.

Millennium Challenge Corporation — Evaluation design The impact evaluation sought to identify the causal impact of exposure to equipment upgrades on subsequent outcomes. Insofar as we were not able to...

Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

This book deals with semiconductor manufacturing equipment. It is comprised of nine chapters, which are manufacturing process of semiconductor device, history of semiconductor manufacturing equipment, kinds and role of semiconductor manufacturing equipment, construction and method of semiconductor manufacturing equipment, introduction of various semiconductor manufacturing equipment, spots of semiconductor manufacturing, technical elements of semiconductor manufacturing equipment, road map of technology of semiconductor manufacturing equipment and semiconductor manufacturing equipment in the 21st century.

The fleet of equipment operated by the Virginia Department of Transportation (VDOT) constitutes a large investment, on the order of half a billion dollars. A means of identifying earlier and more accurately those pieces of equipment whose timely repl...

Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifyingvulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters. PMID:26907313

A workshop was convened in two sessions in January and March 1981, on the remote maintenance equipment for the Fusion Engineering Device (FED). The objectives of the first session were to familiarize the participants with the status of the design of the FED and to develop a remote maintenance equipment list for the FED. The objective of the second session was to have the participants present design concepts for the equipment which had been identified in the first session. The equipment list was developed for general purpose and special purpose equipment. The general purpose equipment was categorized as manipulators and other, while the special purpose equipment was subdivided according to the reactor subsystem it serviced: electrical, magnetic, and nuclear. Both mobile and fixed base manipulators were identified. Handling machines were identified as the major requirement for special purpose equipment

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...

Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identifiedvulnerabilities

Full Text Available Introduction: Iran is constantly exposed to natural disasters such as floods, earthquakes and drought. In the meantime, drought is the major natural disaster which leads to numerous losses in agriculture and water resources, and this phenomenon is slow and creeping.Available evidence suggests that drought management is based on crisis management. As the present management in our country is based on crisis management, and drought-proneareasin thecountryhave become a society vulnerable to drought. So, the authorities require a new set of data for drought preparedness to deal with these challenges, in order to obtain the resources to be properly and effectively prioritized and reduce the effects of drought and its consequences. Undoubtedly, the starting point of vulnerability assessment and risk management is a prerequisite that has been sadly neglected in our country. In this context, the aim of this study is to determine the vulnerability of technical, economic and social vulnerability assessment determined before and after the drought and vulnerability patterns for wheat farmers in the North of Fars province. Materials and Methods: The vulnerability of wheat farmers in the North of Fars province is determined using three methods. The first method measured ex ante vulnerability based on estimated income distributions, and the other identified ex post vulnerability according to farmers asset positions and drought coping strategy in the 1390 drought. The final section determined the patterns of vulnerability using cluster analysis and data mining. A sample of 203 farmers in three plains was selected for interview and collection of necessary farm level data for two years (1390 and 1391 was carried out. In this study, to assess the vulnerability of households in the North of Fars province against drought, the formula Me-bar and Valdez has been used. In North of Fars province, as many other fields, agriculture is the main source of income and income

to understand the meaning of the narrated text. Results. The meaning of maintaining dignity was constituted in a sense of vulnerability to the self, and elucidated in three major interrelated themes: Being involved as a human being, being involved as the person one is and strives to become, and being involved...

Age groups vulnerable to serious attacks of anaphylaxis include infants, teenagers, pregnant women, and the elderly. Concomitant diseases, such as severe or uncontrolled asthma, cardiovascular disease, mastocytosis or clonal mast cell disorders and the concurrent use of some medications such as beta adrenergic ...

The assessment of vulnerability gained more and more attention in flood risk research during the recent years. However, there is still not much knowledge available about flood vulnerability of companies and its influencing factors. This study follows the natural sciences concept which defines vulnerability as the degree of loss to a given element at risk resulting from flooding of a given magnitude. Machine learning algorithms like Random Forests (RFs) are promising approaches, since they consider many influencing variables and as such allow for a detailed assessment of flood vulnerability. Only these variables which are meaningful for the differentiation of a certain target variable are used by the derived models. This allows for an identification of relevant damage influencing variables and hence for a more detailed picture of flood vulnerability of companies. This study aims to identify relevant damage influencing variables by means of the variable importance provided by Random Forests. The data sets used are taken from two surveys conducted after the floods in the Elbe and Danube catchments in the years 2002 and 2013 in Germany. Damage to buildings (n = 430), equipment (n = 651) as well as goods and stock (n = 530) are taken into account. The analysis is done for the entire data set as well as for four groups of different company sectors and the corresponding data subsets. Relevant damage influencing variables separated by sector and assets are identified as, for example, the degree of contamination or precautionary measures undertaken before the flood event. The results provide insight into the damage processes and improve data-acquisition in future surveys by, for instance, asking specific questions for company sectors and assets.

Objective The aims of the present study were to describe the prevalence of vulnerability in a cohort of newborns, identify the factors that increase the risk of vulnerability and examine whether those who are most vulnerable are receiving home visits. Methods A prospective cross-sectional study was performed using data collected from questionnaires completed by child and family health nurses and obstetric discharge summaries for each mother-baby dyad. Descriptive frequencies and percentages are used to describe the proportions of children who were vulnerable, offered services and had risk factors for vulnerability. Categorical data were compared using Pearson's Chi-squared analysis. Results In all, 1517 newborns were included in the present study. Of these, 40.5% were identified as vulnerable and 13.9% had two or more risk factors for vulnerability (95% confidence interval (CI) 12-16%). The most common risk factors were biological. Across all newborns, 33.7% were visited at home, and 74.6% of vulnerable newborns were offered a home visit. Children identified as vulnerable were more likely to have a home visit than those who were not (z for 95% CI=1.96; Pvulnerability allowed the offer of home visiting to be directed towards those most likely to benefit. What is known about the topic? Of the Australian child population, 10-20% are vulnerable to adverse health, developmental and wellbeing outcomes. Vulnerable infants are at a greater risk of becoming vulnerable children, adolescents and adults over the life course. Biological and psychosocial risk factors for vulnerability are well described. Families with the greatest need are often the least likely to access or receive support, and have lower utilisation of preventative health services despite evidence that support in the first few years of life can significantly improve long-term outcomes. What does this paper add? This paper provides a detailed description of vulnerabilities in a cohort of newborns and

The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

BACKGROUND: It has been hypothesized that personality traits affect survival after cancer, but studies have produced inconsistent results. This study examined the association between mental vulnerability and survival after cancer in Denmark in a prospective cohort study. METHODS: Between 1976...... and 2001, 12733 residents of Copenhagen completed a questionnaire eliciting information on a 12-item mental vulnerability scale, as well as various personal data. Follow-up in the Danish Cancer Registry until 2003 identified 884 incident cases of primary cancer, and follow-up for death from the date...... of cancer diagnosis until 2003 identified 382 deaths. Mental vulnerability scores were divided into 4 approximately equal-sized groups. Cox proportional hazards regression models were used to estimate the hazard ratio (HR) of all-cause mortality. RESULTS: Multivariate HR for all-cause mortality for persons...

Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).

Vulnerability assessment models are widely used to systematically evaluate the performance of complex safeguards systems against a variety of threats. These models require varying levels of detail and input data about the physical design of a facility and its safeguards operations and procedures. However, to evaluate safeguards effectiveness and give a performance rating, these models require additional performance data reflecting probabilities of detection, assessment, interruption, and neutralization, as well as the associated times for various adversary scenarios. These data may be attained from equipment design specifications, laboratory testing, expert judgment, or component testing. Regardless of how these data are obtained, they are inherently subjective. This paper addresses the uses of various vulnerability assessment models and the nature of subjectivity in those models. The paper also describes methods for coping with subjective data

Single Point Vulnerability (SPV) analysis is a process used to identify individual equipment whose failure alone will result in a reactor trip, turbine generator failure, or power reduction of more than 50%. Automatic Seismic Trip System (ASTS) is a newly installed system to ensure the safety of plant when earthquake occurs. Since this system directly shuts down the reactor, the failure or malfunction of its system component can cause a reactor trip more frequently than other systems. Therefore, an SPV analysis of ASTS is necessary to maintain its essential performance. To analyze SPV for ASTS, failure mode and effect analysis (FMEA) and fault tree analysis (FTA) was performed. In this study, FMEA and FTA methods were performed to select SPV equipment of ASTS. D/O, D/I, A/I card, seismic sensor, and trip relay had an effect on the reactor trip but their single failure will not cause reactor trip. In conclusion, ASTS is excluded as SPV. These results can be utilized as the basis data for ways to enhance facility reliability such as design modification and improvement of preventive maintenance procedure.

Single Point Vulnerability (SPV) analysis is a process used to identify individual equipment whose failure alone will result in a reactor trip, turbine generator failure, or power reduction of more than 50%. Automatic Seismic Trip System (ASTS) is a newly installed system to ensure the safety of plant when earthquake occurs. Since this system directly shuts down the reactor, the failure or malfunction of its system component can cause a reactor trip more frequently than other systems. Therefore, an SPV analysis of ASTS is necessary to maintain its essential performance. To analyze SPV for ASTS, failure mode and effect analysis (FMEA) and fault tree analysis (FTA) was performed. In this study, FMEA and FTA methods were performed to select SPV equipment of ASTS. D/O, D/I, A/I card, seismic sensor, and trip relay had an effect on the reactor trip but their single failure will not cause reactor trip. In conclusion, ASTS is excluded as SPV. These results can be utilized as the basis data for ways to enhance facility reliability such as design modification and improvement of preventive maintenance procedure

Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

Full Text Available Archi-tecture has lost the reference to its prop “Archi” to develop mostly its “Tecture”: a deceitful form of nihilism, which has given full credit to a hurricane of instruments for which we know no purpose. Any distinction between city and architecture is purely contingent. Contingency is relevant but only in so far as it makes one lose any sense of scale. Many of our cities do not work because our style of life eradicates the sense of hospitality. The city becomes the place where we un-learn how to live together. Hospitality is vulnerability – the construction of vulnerability is the true beauty, the only deterrent against stupidity. Learn to live with the others, to approximate the alterity and its unpredictability. The basic tools of conviviality are the common goods of inter-disciplinarity. Learn to cultivate and educate yourself to phenomenal incompleteness.

The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identifiedvulnerabilities and the impact of suggested plant improvements. No specific definition for open-quotes vulnerabilityclose quotes was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of open-quotes vulnerabilityclose quotes used by the licensees, explicitly identifiedvulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Full Text Available Ebola is an infectious disease, which is caused by a virus belonging to the Filoviridae group. The outbreak of the disease in the African countries in 2015 caused massive death and contamination of the healthcare personnel those who were engaged in treating the infected patients and caused irreparable damage to the healthcare system. In this study, the vulnerability of the team of health service providers during the Ebola outbreak in Liberia, Guinea and Sierra Leone is studied. The article also proposes solutions that can be learned as a lesson, help in increasing their resilience in similar biological hazards and planning management strategies for similar events in the future. Long before the outbreak took place, West African countries were already facing acute problems in terms of access to health services and health infrastructure. The most important shortcomings for the same were identified as insufficient number of health personnel and capacity shortage that prevented the people from being ready to deal with such uncalled events viz. accidents and epidemic disease outbreak. The Ebola epidemic exacerbated the persisting problems caused due to a shortage of personnel in these countries and caused the death of a large number of common people as well as healthcare personnel. Generally, the vulnerability of the health team working during the Ebola outbreak could be divided into five general dimensions: 1. Management weakness; 2. Lack of engineering and environmental control; 3. Obstacles in the use of personal protective equipment; 4. Not having enough skills and practice exercises; and 5. Ignoring the social factors and satisfaction of the healthcare personnel. The main theme of the study was failure to understand the risk of personnel in accidents and disasters. Findings revealed building capacity and reducing vulnerability of the healthcare personnel against disasters and epidemics depends upon the perceived risk, which is a decisive factor

Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...

To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of ScienceTM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.

Identifying communities vulnerable to adverse health effects from exposure to wildfire smoke may help prepare responses, increase the resilience to smoke and improve public health outcomes during smoke days. We developed a Community Health-Vulnerability Index (CHVI) based on fact...

OBJECTIVE: The purpose of this study is to examine whether mental vulnerability is a risk factor for the development of ischemic heart disease (IHD) after adjustment for well-established risk factors. METHODS: In three prospective cohort studies in Copenhagen County, Denmark, we recorded the level...... of mental vulnerability and possible risk factors to IHD at baseline. For follow-up, the sample was linked to relevant registries to identify all cases of fatal and nonfatal IHD. The relationship between mental vulnerability and IHD was examined using both Kaplan-Meir and Cox proportional hazard models...... adjusting for possible confounding factors. RESULTS: Mental vulnerability was significantly associated with the risk for IHD (medium mental vulnerability: hazard ratio 1.41, 95% confidence interval 1.04-1.91; and high mental vulnerability: hazard ratio 2.05; 95% confidence interval 1.46-2.88), after...

The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identifiedvulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.

This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

Report #11-P-0597, September 9, 2011. Vulnerability testing of EPA’s directory service system authentication and authorization servers conducted in March 2011 identified authentication and authorization servers with numerous vulnerabilities.

In the mid-2000s, several highly-cited papers called for improving conceptual coherence and methodological transparency in vulnerability research to support greater policy relevance. As reducing vulnerability rises on political agendas, identifying empirically validated measures will become

Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.

Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identifyvulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

This assessment of High Efficiency Particulate Air (HEPA) filter vulnerability was requested by the USDOE Office of River Protection (ORP) to satisfy a DOE-HQ directive to evaluate the effect of filter degradation on the facility authorization basis assumptions. Within the scope of this assessment are ventilation system HEPA filters that are classified as Safety-Class (SC) or Safety-Significant (SS) components that perform an accident mitigation function. The objective of the assessment is to verify whether HEPA filters that perform a safety function during an accident are likely to perform as intended to limit release of hazardous or radioactive materials, considering factors that could degrade the filters. Filter degradation factors considered include aging, wetting of filters, exposure to high temperature, exposure to corrosive or reactive chemicals, and exposure to radiation. Screening and evaluation criteria were developed by a site-wide group of HVAC engineers and HEPA filter experts from published empirical data. For River Protection Project (RPP) filters, the only degradation factor that exceeded the screening threshold was for filter aging. Subsequent evaluation of the effect of filter aging on the filter strength was conducted, and the results were compared with required performance to meet the conditions assumed in the RPP Authorization Basis (AB). It was found that the reduction in filter strength due to aging does not affect the filter performance requirements as specified in the AB. A portion of the HEPA filter vulnerability assessment is being conducted by the ORP and is not part of the scope of this study. The ORP is conducting an assessment of the existing policies and programs relating to maintenance, testing, and change-out of HEPA filters used for SC/SS service. This document presents the results of a HEPA filter vulnerability assessment conducted for the River protection project as requested by the DOE Office of River Protection

In J-PARC (Japan Proton Accelerator Research Complex) we have set up intra-network (internal network, we will abbreviate it as JLAN, below) to support research activity and communication among users. In JLAN, we set up various kinds of security devices to keep JLAN secure. However, the servers which provide information or service to public are still in danger of being accessed illegally. If there is an illegal access, that may cause defacement of data or information leak. Furthermore, the victim servers are manipulated by the malicious attackers, and they themselves attack the external information equipments. Vulnerability of servers enables unauthorized access. So, vulnerability test with use of a vulnerability tool is one of the most effective ways to take measures for vulnerability of the equipments. However, it is not enough to just conduct a vulnerability test. It is also essential for information security to take measures to cover constantly for the vulnerability of servers. We focused on the points above, and developed the vulnerability testing system for security. It is not only a testing tool for the vulnerability of servers, but also management system which enables the server administrators in charge of taking measures for vulnerabilities to manage risks and handles PDCA (Plan-Do-Check-Action) cycles as countermeasure for vulnerability. In this paper, we report the technologies and ingenuities for the development of the above system. (author)

The polymetallic nodules occur at an average depth of 4500 m. Adequate equipment and techniques are required for the exploration at such depths. Shipboard and various laboratory equipments for the sampling of polymetallic nodules is described...

After a definition of intervention, problems encountered for working in an adverse environment are briefly analyzed for development of various remote handling equipments. Some examples of existing equipments are given [fr

Load Bearing Equipment for Neutral Buoyancy (LBE-NB) is an exercise frame that holds two exercising subjects in position as they apply counter forces to each other for lower extremity and spine loading resistance exercises. Resistance exercise prevents bone loss on ISS, but the ISS equipment is too massive for use in exploration craft. Integrating the human into the load directing, load generating, and motion control functions of the exercise equipment generates safe exercise loads with less equipment mass and volume.

A new type of burnable poison (BP) volume reduction system is currently being developed. Many BP rods, a subcomponent of spent fuel assemblies are discharged from nuclear power reactors. This new system reduces the overall volume of BP rods. The main system consists of BP rod cutting equipment, equipment for the recovery of BP cut pieces, and special transport equipment for the cut rods. The equipment is all operated by hydraulic press cylinders in water to reduce operator exposure to radioactivity. (author)

Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

Full Text Available Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method. The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the levels of risk and the types of vulnerabilities. Results. From a sample of 30 repositories, we could examine 20, identified that: 5% of the repositories have critical vulnerabilities, 85% high, 25% medium and 100% lowers. Conclusions. Which demonstrates the necessity to adapt actions for these environments that promote informational security to minimizing the incidence of external and / or internal systems attacks.Abstract Grey Text – use bold for subheadings when needed.

This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

country policy and the particular risk management focus to the smaller scale risk management perceptions of the analysis techniques employed being to resource expensive, difficult to interpret or to operationalise. This paper will provide a context with some empirical examples to perhaps explain the growing popularity of concepts such as resilience and capacity building which lie more comfortably with policy makers and risk managers as concepts which focus on the solution rather than identifying a problem by assessing social vulnerability.

To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were

Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...

... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures or...

... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions. ...

.... The break out group discussed vulnerability presentation needs common across various application domains, particularly in support of network discovery and network analysis tasks in those domains...

Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

The performance evaluation of space heating equipment for a geothermal application is generally considered from either of two perspectives: (a) selecting equipment for installation in new construction, or (b) evaluating the performance and retrofit requirements of an existing system. With regard to new construction, the procedure is relatively straightforward. Once the heating requirements are determined, the process need only involve the selection of appropriately sized hot water heating equipment based on the available water temperature. It is important to remember that space heating equipment for geothermal applications is the same equipment used in non-geothermal applications. What makes geothermal applications unique is that the equipment is generally applied at temperatures and flow rates that depart significantly from traditional heating system design. This chapter presents general considerations for the performance of heating equipment at non-standard temperature and flow conditions, retrofit of existing systems, and aspects of domestic hot water heating.

This article focuses on a quantitative method to identify financial system vulnerabilities, specifically, an imbalance indicator model (IIM) and its application to Canada. An IIM identifies potential vulnerabilities in a financial system by comparing current economic and financial data with data from periods leading up to past episodes of financial stress. It complements other sources of information - including market intelligence and regular monitoring of the economy - that policy-makers use...

In this century, medical imaging is at the heart of medical practice. Besides providing fast and accurate diagnosis, advances in radiology equipment offer new and previously non-existing options for treatment guidance with quite low morbidity, resulting in the improvement of health outcomes and quality of life for the patients. Although rapid technological development created new medical imaging modalities and methods, the same progress speed resulted in accelerated technical and functional obsolescence of the same medical imaging equipment, consequently creating a need for renewal. Older equipment has a high risk of failures and breakdowns, which might cause delays in diagnosis and treatment of the patient, and safety problems both for the patient and the medical staff. The European Society of Radiology is promoting the use of up-to-date equipment, especially in the context of the EuroSafe Imaging Campaign, as the use of up-to-date equipment will improve quality and safety in medical imaging. Every healthcare institution or authority should have a plan for medical imaging equipment upgrade or renewal. This plan should look forward a minimum of 5 years, with annual updates. Teaching points • Radiological equipment has a definite life cycle span, resulting in unavoidable breakdown and decrease or loss of image quality which renders equipment useless after a certain time period.• Equipment older than 10 years is no longer state-of-the art equipment and replacement is essential. Operating costs of older equipment will be high when compared with new equipment, and sometimes maintenance will be impossible if no spare parts are available.• Older equipment has a high risk of failure and breakdown, causing delays in diagnosis and treatment of the patient and safety problems both for the patient and the medical staff.• Every healthcare institution or authority should have a plan for medical imaging equipment upgrade or replacement. This plan should look forward a

guidance acceleration and seeker sensitivity. For the purpose of this investigation the aircraft is equipped with conventional pyrotechnic decoy flares and the missile has no counter-countermeasure means (security restrictions on open publication). This complete simulation is used to calculate the missile miss distance, when the missile is launched from different locations around the aircraft. The miss distance data is then graphically presented showing miss distance (aircraft vulnerability) as a function of launch direction and range. The aircraft vulnerability graph accounts for aircraft and missile characteristics, but does not account for missile deployment doctrine. A Bayesian network is constructed to fuse the doctrinal rules with the aircraft vulnerability data. The Bayesian network now provides the capability to evaluate the combined risk of missile launch and aircraft vulnerability. It is shown in this paper that it is indeed possible to predict the aircraft vulnerability to missile attack in a comprehensive modelling and a holistic process. By using the appropriate real-world models, this approach is used to evaluate the effectiveness of specific countermeasure techniques against specific missile threats. The use of a Bayesian network provides the means to fuse simulated performance data with more abstract doctrinal rules to provide a realistic assessment of the aircraft vulnerability.

The frequency and intensity of extreme heat events are increasing in New York State (NYS) and have been linked with increased heat-related morbidity and mortality. But these effects are not uniform across the state and can vary across large regions due to regional sociodemographic and environmental factors which impact an individual's response or adaptive capacity to heat and in turn contribute to vulnerability among certain populations. We developed a heat vulnerability index (HVI) to identify heat-vulnerable populations and regions in NYS. Census tract level environmental and sociodemographic heat-vulnerability variables were used to develop the HVI to identify heat-vulnerable populations and areas. Variables were identified from a comprehensive literature review and climate-health research in NYS. We obtained data from 2010 US Census Bureau and 2011 National Land Cover Database. We used principal component analysis to reduce correlated variables to fewer uncorrelated components, and then calculated the cumulative HVI for each census tract by summing up the scores across the components. The HVI was then mapped across NYS (excluding New York City) to display spatial vulnerability. The prevalence rates of heat stress were compared across HVI score categories. Thirteen variables were reduced to four meaningful components representing 1) social/language vulnerability; 2) socioeconomic vulnerability; 3) environmental/urban vulnerability; and 4) elderly/ social isolation. Vulnerability to heat varied spatially in NYS with the HVI showing that metropolitan areas were most vulnerable, with language barriers and socioeconomic disadvantage contributing to the most vulnerability. Reliability of the HVI was supported by preliminary results where higher rates of heat stress were collocated in the regions with the highest HVI. The NYS HVI showed spatial variability in heat vulnerability across the state. Mapping the HVI allows quick identification of regions in NYS that could

Web Vulnerability Scanners (WVSs) are software tools for identifyingvulnerabilities in web applications. There are commercial WVSs, free/open source WVSs, and some companies offer them as a Software-as-a-Service. In this paper, we test and evaluate six free/open source WVSs using the web application WackoPicko with many known vulnerabilities, primary for false negative rates.

Because vulnerability is a conceptual construct rather than a directly observable phenomenon, most vulnerability assessments measure a set of “vulnerability indicators”. In order to identify the core approaches and range of variation in the field, we conducted a systematic literature review on local

Understanding vulnerability to the impacts of global environmental change and identifying adaptation measures to cope with these impacts require localized investigations that can help find actual and exact answers to the questions about who and what are vulnerable, to what are they vulnerable, how

Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.

Pathological gambling is an emerging psychiatric disorder that has medical, psychiatric, and social consequences. Recently, research has been focusing on identifying which portions of the population are most vulnerable to developing problems related to ongoing gambling. Specific populations of interest have included adolescents, elderly, minorities, those with comorbid psychiatric or substance use disorders, and gender differences. Each group possesses unique biological, psychological, and/or...

Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.

Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated s...

An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

LAVA: Large-scale Automated Vulnerability Addition Brendan Dolan -Gavitt∗, Patrick Hulin†, Tim Leek†, Fredrich Ulrich†, Ryan Whelan† (Authors listed...released, and thus rapidly become stale. We can expect tools to have been trained to detect bugs that have been released. Given the commercial price tag...low TCN) and dead (low liveness) program data is a powerful one for vulnera- bility injection. The DUAs it identifies are internal program quantities

Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

Full Text Available The Ebola virus disease (EVD epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identifyvulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

The prediction accuracy of the conventional DRASTIC model (CDM) algorithm for groundwater vulnerability assessment is severely limited by the inherent subjectivity and uncertainty in the integration of data obtained from various sources. This study attempts to overcome these problems by exploring the potential of the analytic hierarchy process (AHP) technique as a decision support model to optimize the CDM algorithm. The AHP technique was utilized to compute the normalized weights for the seven parameters of the CDM to generate an optimized DRASTIC model (ODM) algorithm. The DRASTIC parameters integrated with the ODM algorithm predicted which among the study areas is more likely to become contaminated as a result of activities at or near the land surface potential. Five vulnerability zones, namely: no vulnerable(NV), very low vulnerable (VLV), low vulnerable (LV), moderate vulnerable (MV) and high vulnerable (HV) were identified based on the vulnerability index values estimated with the ODM algorithm. Results show that more than 50% of the area belongs to both moderate and high vulnerable zones on the account of the spatial analysis of the produced ODM-based groundwater vulnerability prediction map (GVPM).The prediction accuracy of the ODM-based – GVPM with the groundwater pH and manganese (Mn) concentrations established correlation factors (CRs) result of 90 % and 86 % compared to the CRs result of 62 % and 50 % obtained for the validation accuracy of the CDM – based GVPM. The comparative results, indicated that the ODM-based produced GVPM is more reliable than the CDM – based produced GVPM in the study area. The study established the efficacy of AHP as a spatial decision support technique in enhancing environmental decision making with particular reference to future groundwater vulnerability assessment

The objective and the scope of this document are to list and briefly describe the major mobile equipment necessary for waste package (WP) retrieval from the proposed subsurface nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the equipment are explained and summarized in the individual subsections of this document. There are no quality assurance requirements or QA controls in this document. Retrieval under normal conditions is accomplished with the same fleet of equipment as is used for emplacement. Descriptions of equipment used for retrieval under normal conditions is found in Emplacement Equipment Descriptions, DI: BCAF00000-01717-5705-00002 (a document in progress). Equipment used for retrieval under abnormal conditions is addressed in this document and consists of the following: (1) Inclined Plane Hauler; (2) Bottom Lift Transporter; (3) Load Haul Dump (LHD) Loader; (4) Heavy Duty Forklift for Emplacement Drifts; (5) Covered Shuttle Car; (6) Multipurpose Vehicle; and (7) Scaler

High-power hadron accelerators have strict limits on fractional beam loss. In principle, once a high-quality beam is set up in an acceptable state, beam loss should remain steady. However, in practice, there are many trips in operational machines, owing to excessive beam loss. This paper deals with monitoring equipment health to identify precursor signals that indicate an issue with equipment that will lead to unacceptable beam loss. To this end, a variety of equipment and beam signal measurements are described. In particular, several operational examples from the Spallation Neutron Source (SNS) of deteriorating equipment functionality leading to beam loss are reported.

Know What to Expect When Managing Medical Equipment and Healthcare Technology in Your Organization As medical technology in clinical care becomes more complex, clinical professionals and support staff must know how to keep patients safe and equipment working in the clinical environment. Accessible to all healthcare professionals and managers, Medical Equipment Management presents an integrated approach to managing medical equipment in healthcare organizations. The book explains the underlying principles and requirements and raises awareness of what needs to be done and what questions to ask. I

The contents of this book are introduction of data communication on definition, purpose and history, information terminal about data communication system and data transmission system, data transmit equipment of summary, transmission cable, data port, concentrator and front-end processor, audio communication equipment like phones, radio communication equipment of summary on foundation of electromagnetic waves, AM transmitter, AM receiver, FM receiver and FM transmitter, a satellite and mobile communication equipment such as earth station, TT and C and Cellular phone, video telephone and new media apparatus.

Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identifyvulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To

Cooling of electronic equipment is studied. The design size of electronic equipment decrease causing the thermal density to increase. This affect the cooling which can cause for example failures of critical components due to overheating or thermal induced stresses. Initially a pin fin heat sink...

This paper reviews the literature on the optimal replacement of capital equipment, especially farm machinery. It also considers the influence of taxation and capital rationing on replacement decisions. It concludes that special taxation provisions such as accelerated depreciation and investment allowances are unlikely to greatly influence farmers' capital equipment replacement decisions in Australia.

This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

Analyses of social and environmental management in transnational product chains focus often upstream on suppliers in socially and institutionally vulnerable countries and these suppliers' hazardous processes. Furthermore focus is on transnational companies' responsibility when they source from...... such suppliers. On the contrary, not much focus has been on transnational companies' downstream export of hazardous products to vulnerable countries and the product use in those countries. The article uses pesticides as case of hazardous products and identifies mechanisms in the downstream social...... and environmental management of a Danish pesticide company in vulnerable countries and especially in Brazil. The identified mechanisms are: the transnational company's on-going interpretation of the regulatory and ethical obligations for development and use of its hazardous products in vulnerable countries, path...

An overarching challenge of natural resource management and biodiversity conservation is that relationships between people and nature are difficult to integrate into tools that can effectively guide decision making. Social-ecological vulnerability offers a valuable framework for identifying and understanding important social-ecological linkages, and the implications of dependencies and other feedback loops in the system. Unfortunately, its implementation at local scales has hitherto been limited due at least in part to the lack of operational tools for spatial representation of social-ecological vulnerability. We developed a method to map social-ecological vulnerability based on information on human-nature dependencies and ecosystem services at local scales. We applied our method to the small-scale fishery of Moorea, French Polynesia, by combining spatially explicit indicators of exposure, sensitivity, and adaptive capacity of both the resource (i.e., vulnerability of reef fish assemblages to fishing) and resource users (i.e., vulnerability of fishing households to the loss of fishing opportunity). Our results revealed that both social and ecological vulnerabilities varied considerably through space and highlighted areas where sources of vulnerability were high for both social and ecological subsystems (i.e., social-ecological vulnerability hotspots) and thus of high priority for management intervention. Our approach can be used to inform decisions about where biodiversity conservation strategies are likely to be more effective and how social impacts from policy decisions can be minimized. It provides a new perspective on human-nature linkages that can help guide sustainability management at local scales; delivers insights distinct from those provided by emphasis on a single vulnerability component (e.g., exposure); and demonstrates the feasibility and value of operationalizing the social-ecological vulnerability framework for policy, planning, and participatory

SECURITY CLASSIFICATION OF: 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES 12. DISTRIBUTION AVAILIBILITY STATEMENT 6. AUTHORS...correctly. Developers rarely develop with consideration for eliminating vulnerabilities in source code. Source code is not always available for...as deep neural networks. We also plan to define heuristics on what type of learners and features to use with identifying different vulnerabilities

This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

U.S. Department of Health & Human Services — Social vulnerability refers to the resilience of communities when confronted by external stresses on human health, stresses such as natural or human-caused...

To help understand a network and its ability to continue operating when under attack, the break out group discussed issues that need to be considered when presenting network vulnerability information...

Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

Several thousand software design vulnerabilities have been reported through established databases. But they need to be structured and classified to be optimally usable in the pursuit of minimal and effective mitigation mechanism. In order we developed a criterion set for a communicative description of the same to serve the purpose as a taxonomic description of security vulnerabilities, arising in the design phase of Software development lifecycle. This description is a part of an effort to id...

The author discusses the section of the ASHRAE Standard 90.1-1989 which addresses HVAC systems and equipment. New features of HVAC systems mandatory general requirements are described. New prescriptive requirements are detailed.

... of personal protective equipment A safety program for new employees is a necessary part of any orientation program An on-going safety program should be used to motivate employees to continue to use...

The last twenty years have seen major advances in the electronics industry. Perhaps the most significant aspect of these advances has been the significant role that electronic equipment plays in almost all product markets. Even though electronic equipment is used in a broad base of applications, many future applications have yet to be conceived. This versatility of electron­ ics has been brought about primarily by the significant advances that have been made in integrated circuit technology. The electronic product user is rarely aware of the integrated circuits within the equipment. However, the user is often very aware of the size, weight, mod­ ularity, maintainability, aesthetics, and human interface features of the product. In fact, these are aspects of the products that often are instrumental in deter­ mining its success or failure in the marketplace. Optimizing these and other product features is the primary role of Electronic Equipment Packaging Technology. As the electronics industry continues to pr...

This document describes the limits of the responsibilities of the TS/CV for fire fighting equipment at the LHC. The various interfaces, providers and users of the water supply systems and clean water raising systems are described.

Hydraulic testing in boreholes is one major task of the hydrogeological program in the Stripa Project. A new testing equipment for this purpose was constructed. It consists of a downhole part and a surface part. The downhole part consists of two packers enclosing two test-sections when inflated; one between the packers and one between the bottom packer and the bottom of the borehole. A probe for downhole electronics is also included in the downhole equipment together with electrical cable and nylon tubing. In order to perform shut-in and pulse tests with high accuracy a surface controlled downhole valve was constructed. The surface equipment consists of the data acquisition system, transducer amplifier and surface gauges. In the report detailed descriptions of each component in the whole testing equipment are given. (Auth.)

The vulnerability of roads and associated structures in the City of Greater Sudbury to the effects of climate change was evaluated using the Public Infrastructure Vulnerability Committee (PIEVC) Engineering Protocol for Climate Change Infrastructure Assessment. Study objectives were to evaluate the vulnerability of road-related infrastructure in Greater Sudbury to climate change, and to identify potential impediments to the application of the protocol in other municipalities. Based on the experience gained during this study, recommendations were provided with respect to the vulnerabilities of roads and associated structures to the predicted effects of climate change and the performance of vulnerability assessments. (author)

SAVI (Systematic Analysis of Vulnerability to Intrusion) is a new PC-based software package for modeling Physical Protection Systems (PPS). SAVI utilizes a path analysis approach based on the Adversary Sequence Diagram (ASD) methodology. A highly interactive interface allows the user to accurately model complex facilities, maintain a library of these models on disk, and calculate the most vulnerable paths through any facility. Recommendations are provided to help the user choose facility upgrades which should reduce identified path vulnerabilities. Pop-up windows throughout SAVI are used for the input and display of information. A menu at the top of the screen presents all options to the user. These options are further explained on a message line directly below the menu. A diagram on the screen graphically represents the current protection system model. All input is checked for errors, and data are presented in a logical and clear manner. Print utilities provide the user with hard copies of all information and calculated results

This paper explores the potential vulnerability of solar energy systems to future extreme event risks as a consequence of climate change. We describe the three main technologies likely to be used to harness sunlight -- thermal heating, photovoltaic (PV), and concentrating solar power (CSP) -- and identify critical extreme event vulnerabilities for each one. We then compare these vulnerabilities with assessments of future changes in extreme event risk levels. We do not identify any vulnerabili...

After the accident in Fukushima, nuclear safety as topic in anti-nuclear work has gained importance within the Joint Project countries. Therefore, nuclear safety and in particular the activities of the European stress tests were chosen to be the main focus of the Joint Project 2011/2012 as well as the common theme of the national projects. This brochure describes: A) Vulnerability Assessment A critical review of the EU Nuclear Stress Tests in Bulgaria, Hungary, Romania and Ukraine is presented in chapter 1. The review details the main weaknesses identified within the stress tests. Important shortcomings not mentioned in the stress tests reports are also discussed. These evaluations do not claim to be exhaustive, but the findings contribute to a more comprehensive understanding of safety and risk of nuclear power plants in Europe. B) Transparency of the stress tests In chapter 2 the experience of the Joint Project NGOs concerning transparency of the stress tests is presented. The information is not meant to be an evaluation of the transparency of the stress tests in general – such an evaluation is not possible within the scope of this brochure. The evaluation aims to show activities concerning stress tests and how they were conceived by the JP NGOs. Some recommendations for improvement are given. C) Safety focus Within the main topic “nuclear safety” of the Joint Project 2011/2012 the NGOs of each JP country selected a special safety relevant topic, which is/was of particular interest in their country: Bulgaria: The short story of Belene NPP – The victory – Key points of the campaign against the nuclear power plant Romania: Risks of the CANDU reactor design Czech Republic: Results of the conference “Power Plant Load Testing: Safety Inspection or Propaganda?“ Slovakia: Safety deficits of the NPP Mochovce These safety relevant issues are discussed in separate sections within the brochure at hand. (author)

After the accident in Fukushima, nuclear safety as topic in anti-nuclear work has gained importance within the Joint Project countries. Therefore, nuclear safety and in particular the activities of the European stress tests were chosen to be the main focus of the Joint Project 2011/2012 as well as the common theme of the national projects. This brochure describes: A) Vulnerability Assessment A critical review of the EU Nuclear Stress Tests in Bulgaria, Hungary, Romania and Ukraine is presented in chapter 1. The review details the main weaknesses identified within the stress tests. Important shortcomings not mentioned in the stress tests reports are also discussed. These evaluations do not claim to be exhaustive, but the findings contribute to a more comprehensive understanding of safety and risk of nuclear power plants in Europe. B) Transparency of the stress tests In chapter 2 the experience of the Joint Project NGOs concerning transparency of the stress tests is presented. The information is not meant to be an evaluation of the transparency of the stress tests in general – such an evaluation is not possible within the scope of this brochure. The evaluation aims to show activities concerning stress tests and how they were conceived by the JP NGOs. Some recommendations for improvement are given. C) Safety focus Within the main topic “nuclear safety” of the Joint Project 2011/2012 the NGOs of each JP country selected a special safety relevant topic, which is/was of particular interest in their country: Bulgaria: The short story of Belene NPP – The victory – Key points of the campaign against the nuclear power plant Romania: Risks of the CANDU reactor design Czech Republic: Results of the conference “Power Plant Load Testing: Safety Inspection or Propaganda?“ Slovakia: Safety deficits of the NPP Mochovce These safety relevant issues are discussed in separate sections within the brochure at hand. (author)

ABSTRACT OBJECTIVE To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. METHODS We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. RESULTS AND CONCLUSIONS The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability. PMID:29020122

Full Text Available ABSTRACT OBJECTIVE To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. METHODS We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. RESULTS AND CONCLUSIONS The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.

There are no known biomedical or genetic markers to identify which infants with galactosaemia (GAL) are most at risk of poor language skill development, yet pre-linguistic communicative "red flag" behaviours are recognised as early identifiers of heightened vulnerability to impaired language development. We report on pre-linguistic…

The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

Within the framework of the 'Emergency programme for Nuclear Safety of Kozloduy NPP' it has been concluded that the increase in seismic safety of a NPP can be achieved by upgrading the key equipment in a cost effective way. Essential and vulnerableequipment has to be identified. Seismic capacity should be evaluated base don realistic state of the art criteria. Seismic review teams ef experienced engineers should conduct planned walk-downs in order to propose effective upgrading solutions. Team work of plan engineers and construction engineers would enhance the effectiveness of the solutions. It is recommended that all the participants be motivated and have a clear understanding of the objectives of the upgrading

This document provides an inventory of Tank Farm equipment stored or abandoned aboveground and potentially subject to regulation. This inventory was conducted in part to ensure that Westinghouse Hanford Company (WHC) does not violate dangerous waste laws concerning storage of potentially contaminated equipment/debris that has been in contact with dangerous waste. The report identifies areas inventoried and provides photographs of equipment

Research ethics committees (RECs) may misunderstand the vulnerability of participants, given their distance from the field. What RECs identify as the vulnerabilities that were not adequately recognized in protocols and how they attempt to protect the perceived vulnerability of participants and mitigate risks were examined using the response letters sent to researchers by three university-based RECs. Using a critical qualitative method informed by feminist ethics, we identified an overarching theme of recognizing and responding to cascading vulnerabilities and four subthemes: identifyingvulnerable groups, recognizing potentially risky research, imagining the "what ifs," and mitigating perceived risks. An ethics approach that is up-close, as opposed to distant, is needed to foster closer relationships among participants, researchers, and RECs and to understand participant vulnerability and strength better.

As part of the U.S. Department of Energy's (DOE) initiative to identify potential chemical safety vulnerabilities in the DOE complex, the Chemical Safety Vulnerability Core Working Group issued a field verification assessment report. While the report concluded that Savannah River Site (SRS) is moving in a positive direction, the report also identified five chemical safety vulnerabilities with broad programmatic impact that are not easily nor quickly remedied. The May 1994 SRS Management Response Plan addressed the five SRS vulnerabilitiesidentified in the field assessment report. The SRS response plan listed observations supporting the vulnerabilities and any actions taken or planned toward resolution. Many of the observations were resolved by simple explanations, such as the existence of implementation plans for Safety Analysis Report updates. Recognizing that correcting individual observations does not suffice in remedying the vulnerabilities, a task team was assembled to address the broader programmatic issues and to recommend corrective actions

software and manual TEVA-SPOT is used by water utilities to optimize the number and location of contamination detection sensors so that economic and/or public health consequences are minimized. TEVA-SPOT is interactive, allowing a user to specify the minimization objective (e.g., the number of people exposed, the time to detection, or the extent of pipe length contaminated). It also allows a user to specify constraints. For example, a TEVA-SPOT user can employ expert knowledge during the design process by identifying either existing or unfeasible sensor locations. Installation and maintenance costs for sensor placement can also be factored into the analysis. Python and Java are required to run TEVA-SPOT

Full Text Available It is acknowledged that teacher training programmes around HIV in most of sub-Saharan Africa appear not to have been very effective in assisting teachers to respond to the demands placed on them by the pandemic. In response to the need identified by international development agencies, for research into teacher education and HIV in sub-Saharan Africa, this study investigated teacher perceptions of the effectiveness of training programmes offered in a specific school district in South Africa to equip them to deal with issues arising from having orphans and vulnerable children in their classrooms. A qualitative research design was followed to purposively select teachers who had attended the departmental training to participate in focus groups to explore the phenomenon of teaching orphaned and vulnerable children. The findings that emerged from the thematic data analysis provided supporting evidence that current teacher education approaches in this regard are not perceived to be effective. The results are used to suggest guidelines for an alternative approach to the current forms of HIV and AIDS training for teachers that is more likely to be sustainable, culturally appropriate and suited to the context.

The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility

When an operator hears sounds in a plantsite, the operator compares normal sounds of equipment which he previously heard and remembered with sounds he actually hears, to judge if they are normal or abnormal. According to the method, there is a worry that abnormal conditions can not be appropriately judged in a case where the number of objective equipments is increased and in a case that the sounds are changed gradually slightly. Then, the device of the present invention comprises a plurality of monitors for monitoring the operation sound of equipments, a recording/reproducing device for recording and reproducing the signals, a selection device for selecting the reproducing signals among the recorded signals, an acoustic device for converting the signals to sounds, a switching device for switching the signals to be transmitted to the acoustic device between to signals of the monitor and the recording/reproducing signals. The abnormality of the equipments can be determined easily by comparing the sounds representing the operation conditions of equipments for controlling the plant operation and the sounds recorded in their normal conditions. (N.H.)

Abandonment of agricultural land is one of the main changes in Mediterranean land use. To mitigate runoff and erosion from abandoned land, it is necessary to identify locations that are vulnerable to erosion as a result of land abandonment. The objective of our study was to identifyvulnerable areas

This article examines changes in livelihood strategies in response to flooding. It does so on the basis of a household survey which was undertaken in three provinces in north central Vietnam. All households in the survey were regularly affected by flooding, but only poor households experience a l...... the impact of flooding in the provinces. The article ends by looking at the vulnerability-resilience debate concluding that the poorer households could enter a vulnerability loop, unless new strategies to cope with natural hazards are suggested....

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

After a recall of some definitions relating to decontamination techniques and of the regulation into effect, the principles to be respected to arrange rationally work zones are quoted while insisting more particularly on the types of coatings which facilitate maintenance operations and the dismantling of these installations. Then, the processes and equipments to use in decontamination units for routine or particular operations are described; the list of recommended chemical products to decontaminate the equipment is given. The influence of these treatments on the state and the duration of life of equipments is studied, and some perfectible methods are quoted. In the appendix, are given: the limits of surface contamination accepted in the centers; a standard project which defines the criteria of admissible residual contamination in wastes considered as cold wastes; some remarks on the interest that certain special ventilation and air curtain devices for the protection of operators working on apparatus generating contaminated dusts [fr

Water managers are confronted with uncertainties arising from hydrological, societal, economical and political drivers. To manage these uncertainties two paradigms have been identified: top-down and bottom-up approaches. Top-down or prediction-based approaches use socio-economic scenarios together with a discrete set of GCM projections (often downscaled) to assess the expected impact of drivers and policies on water resource system through various hydrological and social systems models. Adaptation strategies to alleviate these impacts are then identified and tested against the scenarios. To address GCM and downscaling uncertainties, these approaches put more focus on climate predictions, rather than the decision problem itself. Triggered by the wish to have a more scenario-neutral approach and address downscaling uncertainties, recent analyses have been shifted towards vulnerability-based (bottom-up or decision-centric) approaches. They begin at the local scale by addressing socio-economic responses to climate, often involving stakeholder's input; identifyvulnerabilities under a larger sample of plausible futures and evaluate sensitivity and robustness of possible adaptation options. Several bottom-up approaches have emerged so far and are increasingly recommended. Fundamentally they share several core ideas, however, subtle differences exist in vulnerability assessment, visualization tools for exploring vulnerabilities and computational methods used for identifying robust water policies. Through this study, we try to identify how these approaches are progressing, how the climate and non-climate uncertainties are being confronted and how to integrate existing and new tools. We find that choice of a method may depend on the number of vulnerability drivers identified and type of threshold levels (environmental conditions or policy objectives) defined. Certain approaches are suited well for assessing adaptive capacities, tipping points and sequencing of decisions

BACKGROUND: The availability and optimal utilization of medical equipment is important for improving the quality of health services. Significant investments are made for the purchase, maintenance and repair of medical equipment. Inadequate management of these equipment will result in financial losses and deprive the public of the intended benefits. This analysis is based on the conceptual framework drawn from the WHO recommended- lifecycle of medical equipment. AIMS: (1) To identify the probl...

The Connected Equipment Maturity Model (CEMM) evaluates the high-level functionality and characteristics that enable equipment to provide the four categories of energy-related services through communication with other entities (e.g., equipment, third parties, utilities, and users). The CEMM will help the U.S. Department of Energy, industry, energy efficiency organizations, and research institutions benchmark the current state of connected equipment and identify capabilities that may be attained to reach a more advanced, future state.

The Reactor Vital Equipment Determination Techniques program at the Los Alamos National Laboratory is discussed. The purpose of the program is to provide the Nuclear Regulatory Commission (NRC) with technical support in identifying vital areas at nuclear power plants using a fault-tree technique. A reexamination of some system modeling assumptions is being performed for the Vital Area Analysis Program. A short description of the vital area analysis and supporting research on modeling assumptions is presented. Perceptions of program modifications based on the research are outlined, and the status of high-priority research topics is discussed

Global freshwater vulnerability is a product of environmental and human dimensions, however, it is rarely assessed as such. Our approach identifies freshwater vulnerability using four broad categories: endowment, demand, infrastructure, and institutions, to capture impacts on natural and managed water systems within the coupled human-hydrologic environment. These categories are represented by 19 different endogenous and exogenous characteristics affecting water supply vulnerability. By evaluating 119 lower per capita income countries (Yemen and Djibouti nearly as vulnerable. Surprising similarities in vulnerability were also found among geographically disparate nations such as Vietnam, Sri Lanka, and Guatemala. Determining shared patterns of freshwater vulnerability provides insights into why water supply vulnerabilities are manifested in human-water systems at the national scale.

The invention refers to a charging equipment, particularly on board charging equipment for charging traction batteries of an electric vehicle from the AC mains supply, consisting of a DC converter, which contains a controlled power transistor, a switching off unloading circuit and a power transmitter, where the secondary winding is connected in series with a rectifier diode, and a smoothing capacitor is connected in parallel with this series circuit. A converter module is provided, which consists of two DC voltage converters, whose power transistors are controlled by a control circuit in opposition with a phase displacement of 180/sup 0/.

Operation that is safe, reliable, effective and acceptable to public is the common message in a mission statement of commercial nuclear power plants (NPPs). To fulfill these goals, nuclear industry, among other areas, has to focus on: 1 Human Performance (HU) and 2 Equipment Reliability (EQ). The performance objective of HU is as follows: The behaviors of all personnel result in safe and reliable station operation. While unwanted human behaviors in operations mostly result directly in the event, the behavior flaws either in the area of maintenance or engineering usually cause decreased equipment reliability. Unsatisfied Human performance leads even the best designed power plants into significant operating events, which can be found as well-known examples in nuclear industry. Equipment reliability is today recognized as the key to success. While the human performance at most NPPs has been improving since the start of WANO / INPO / IAEA evaluations, the open energy market has forced the nuclear plants to reduce production costs and operate more reliably and effectively. The balance between these two (opposite) goals has made equipment reliability even more important for safe, reliable and efficient production. Insisting on on-line operation by ignoring some principles of safety could nowadays in a well-developed safety culture and human performance environment exceed the cost of electricity losses. In last decade the leading USA nuclear companies put a lot of effort to improve equipment reliability primarily based on INPO Equipment Reliability Program AP-913 at their NPP stations. The Equipment Reliability Program is the key program not only for safe and reliable operation, but also for the Life Cycle Management and Aging Management on the way to the nuclear power plant life extension. The purpose of Equipment Reliability process is to identify, organize, integrate and coordinate equipment reliability activities (preventive and predictive maintenance, maintenance

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country's vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations

A method of identifying non-metallic objects by means of X-ray equipment is described in detail. A small metal pin with a number of grooves cut in a pre-determined equi-spaced pattern is implanted into the non-metallic object and by decoding the groove patterns using X-ray equipment, the object is uniquely identified. A specific example of such an application is in studying the migratory habits of fish. The pin inserted into the snout of the fish is 0.010 inch in diameter, 0.040 inch in length with 8 possible positions for grooves if spaced 0.005 inch apart. With 6 of the groove positions available for data, the capacity is 2 6 or 64 combinations; clearly longer pins would increase the data capacity. This method of identification is a major advance over previous techniques which necessitated destruction of the fish in order to recover the identification tag. (UK)

26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.

Full Text Available South Africa, like the rest of Africa, is considered highly vulnerable to climate change and variability as well as to global change. Climate change is and will continue to be an issue of concern in the development of the country. South Africa faces...

One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life,

31 14 Graphical Representation of the Summary Judgments of the Effectiveness, Vulnerability, and Understanding of the Subsystems’ as Judged by...posed several challenges. Numerous organizational typologies have been suggested over the years ( Robbins , 1994), and these typologies are often based...structure and functioning from a typology perspective ( Robbins , 1994), excerpts from a task analysis that described how the analysts currently performed

Full Text Available This article is devoted to the vulnerability of the application solution based on the “1C: Enterprise 8” platform, which can be used by only built-in tools of the platform. Possible threats and attack algorithm are described.

The estimation of vulnerability risk is at the core of any IT security management strategy. Among technical and infrastructural metrics of risk, attacker economics represent an emerging new aspect that several risk assessment methodologies propose to consider (e.g., based on game theory). Yet the

Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

Atherosclerosis is the single most important contributor to cardiovascular diseases, the leading cause of death in industrialized countries. Atherosclerosis complications such as vulnerable coronary plaque rupture or erosion result in acute coronary events, i.e. myocardial infarction and sudden death. Vulnerable plaques initially develop eccentrically without impeding on the vessel lumen and are therefore not detectable using angiography. New techniques for the investigation of vulnerable plaques are needed to identify and treat vulnerable patients. Invasive techniques require the use of intracoronary probes and are thereby not applicable to large populations of patients. Intravascular ultrasound (IVUS) and optical coherence tomography (OCT) are the most promising invasive modalities. They provide morphological data that could potentially be associated with a more functional approach such as thermography, elasto-graphy, or spectroscopy, Non-invasive techniques are better suited for studying larger populations of patients. Computed tomography is currently used for calcium scoring, but the biological meaning and the prognostic value of this index remain to be fully determined. Non-invasive coronary magnetic resonance imaging (MRI) faces numerous technical challenges, and it essentially provides morphological data. Molecular nuclear imaging offers a great sensitivity and the ability to provide metabolic data about atherosclerotic lesions. New potential tracers of vulnerable plaques are currently being evaluated. Nuclear Medicine should therefore play a major role in the future as a non invasive imaging modality for the assessment of vulnerable atherosclerotic plaques. (author)

The experimental equipment in use at Utrecht university is discussed. Attention is paid to the tandem Van de Graaff accelerator and the 4MV and 1MV accelerators. The detection systems for gamma-ray spectroscopy are reviewed with emphasis on the compton-suppression spectrometer. The data-handling system used for experiments with the tandem is also briefly discussed

Research work at the Agency's Laboratory of Marine Radioactivity in Monaco, including that concerned with pollution of the sea, has been made more effective by its latest acquisition of equipment. This is a spectrophotometer donated by the Federal Republic of Germany. (author)

The gas plant at Kaarstoe was built as part of the Statpipe gas transport system and went on stream in 1985. In 1993 another line was routed from the Sleipner field to carry condensate, and the plant was extended accordingly. Today heavy additional supply- and export lines are under construction, and the plant is extended more than ever. The main role of the factory is to separate the raw gas into commercial products and to pump or ship it to the markets. The site covers a large number of well-known mechanical equipment. This presentation deals with piping, mechanical and structural disciplines. The lifetime of mechanical equipment is often difficult to predict as it depends on many factors, and the subject is complex. Mechanical equipment has been kept in-house, which provides detailed knowledge of the stages from a new to a 14 years old plant. The production regularity has always been very high, as required. The standard of the equipment is well kept, support systems are efficient, and human improvisation is extremely valuable.

The current booklet is intended to give a full and balanced description of the techniques and equipment used for both nuclear material accountancy and containment and surveillance measures, and for the new safeguards measure of environmental sampling. As new verification measures continue to be developed, the material in the booklet will be periodically reviewed and updated versions issued. (author)

Fire managers are challenged with an ever-increasing array of both responsibilities and critics. As in the past, fire managers must master the elements of fire behavior and ecology using the latest technologies. In addition, todayâs managers must be equipped with the skills necessary to understand and liaise with a burgeoning group of vocal stakeholders while also...

Experimental equipment around the ORPHEE reactor is presented. The neutron source; and the spectrometers and sample environment (inelastic and quasi-elastic scattering, elastic scattering, spread scattering, small angle scattering) are described. An experiment proposal and reports guide is supplied [fr

This report describes the results of an investigation into the seismic qualification of equipment located in CANDU nuclear power plants. It is particularly concerned with the evaluation of current seismic qualification requirements, the development of a suitable methodology for the seismic qualification of safety systems, and the evaluation of seismic qualification analysis and testing procedures

In a cross-disciplinary study, we carried out an extensive literature review to increase understanding of vulnerability indicators used in the disciplines of earthquake- and flood vulnerability assessments. We provide insights into potential improvements in both fields by identifying and comparing quantitative vulnerability indicators grouped into physical and social categories. Next, a selection of index- and curve-based vulnerability models that use these indicators are described, comparing several characteristics such as temporal and spatial aspects. Earthquake vulnerability methods traditionally have a strong focus on object-based physical attributes used in vulnerability curve-based models, while flood vulnerability studies focus more on indicators applied to aggregated land-use classes in curve-based models. In assessing the differences and similarities between indicators used in earthquake and flood vulnerability models, we only include models that separately assess either of the two hazard types. Flood vulnerability studies could be improved using approaches from earthquake studies, such as developing object-based physical vulnerability curve assessments and incorporating time-of-the-day-based building occupation patterns. Likewise, earthquake assessments could learn from flood studies by refining their selection of social vulnerability indicators. Based on the lessons obtained in this study, we recommend future studies for exploring risk assessment methodologies across different hazard types.

The purpose of this document is to list the Characterization equipment drawings that are classified as Essential Drawings and Support Drawings. Essential Drawings: Are those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment (HNF 1997a). Support Drawings: Are those drawings identified by facility staff that further describe the design details of structures, systems, or components shown on essential drawings. (HNF 1997a) The Characterization equipment drawings identified in this report are deemed essential drawings as defined in HNF-PRO-242, Engineering Drawing Requirements (HNF 1997a). These drawings will be prepared, revised, and maintained per HNF-PRO-440, Engineering Document Change Control (HNF 1997b). All other Characterization equipment drawings not identified in this document will be considered General drawings until the Characterization Equipment Drawing Evaluation Report (Wilson 1998) is updated during fiscal year 1999. Trucks 1 and 2 drawings are not included in this revision of the essential drawing list due to uncertainty about future use

This document presents the results of a task to evaluate Tank Waste Remediation System (TWRS) sampling equipment drawings and identifies drawings category as either essential, support, or general drawings. This report completes the drawing evaluation task as outlined in Engineering Task Plan For Truck 3 and 4 Drawing Compliance and Evaluation (Wilson, 1997). The scope of this report is limited to an evaluation and identification of drawing category for drawings of certain tank waste sampling equipment for which the TRWS Characterization Project has been assigned custody, including: vapor sampling, grab sampling, auger sampling, and all core sampling equipment (see LMHC Task Order 304). This report does not address drawings for other waste tank deployed equipment systems having similar assigned custody, such as, Light Duty Utility Arm (LDUA), Cone Penetrometer system, or Long Length Contaminated Equipment (LLCE). The LDUA drawings are addressed in the Characterization Equipment Essential Drawings (HNF 1998). The Cone Penetrometer system drawings which are vendor drawings (not H- series) is not currently turned over to operations for deployment. The LLCE equipment was just recently assigned to Characterization Project and were not included in the original scope for this evaluation and will be addressed in the evaluation update scheduled for fiscal year 1999

The objective of EPRI's electrical equipment qualification research program is to provide technical assistance to utilities in meeting nuclear plant safety requirements in a manner consistent with the state of the art. This paper reports progress on several research projects including: radiation effects studies, which compile data on degradation of organic materials in electrical equipment exposed to operational and accident radiation doses; the Equipment Qualification Data Bank, which is a remotely accessible computer system for disseminating qualification information on in-plant equipment, seismic data, and materials data; an aging/seismic correlation program, which is providing test data showing that, in many cases, age degradation has a negligibly small effect on the performance of electrical components under seismic excitation; a review of condition monitoring techniques, which has identified surveillance methods for measuring key performance parameters that have the potential for predicting remaining equipment life; and large-scale hydrogen burn equipment response tests, which are providing data to assess the ability of equipment to remain functional during and after hydrogen burning in postulated degraded core accidents

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms

Identifyingvulnerabilities in power networks is an important problem, as even a small number of vulnerable connections can cause billions of dollars in damage to a network. In this paper, we investigate a graph theoretical formulation for identifyingvulnerabilities of a network. We first try to find the most critical components in a network by finding an optimal solution for each possible cutsize constraint for the relaxed version of the inhibiting bisection problem, which aims to find loosely coupled subgraphs with significant demand/supply mismatch. Then we investigate finding critical components by finding a flow assignment that minimizes the maximum among flow assignments on all edges. We also report experiments on IEEE 30, IEEE 118, and WSCC 179 benchmark power networks.

Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure. There could be many types of failures in the ERP systems. There are different types of measures or characteristics that can be defined for ERP systems to handle the levels of failure. Here in this paper, various types of failure levels are identified along with various characteristics which are concerned with those failures. The relation between all these is summarized. The disruptions causing vulnerabilities in TEIs are identified .A vulnerability management cycle has been suggested along with many commercial and open source vulnerability management tools. The paper also highlights the importance of resiliency in ERP systems in TEIs.

Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress

This case presents a teaching tool which requires students to identify an optimal equipment plan for a northern plains small grain farm. Students are presented with information from a farm owner regarding farm size, available labor, farming techniques used and other relevant issues. Students are required to analyze this information to identify the equipment necessary to operate the farm. Students must balance equipment costs and labor issues. They must develop a plan that remains within a pre...

This book is divided two parts about visual communication and terminal equipment. The first part introduces visual communication, which deals with foundation of visual communication, technique of visual communication, equipment of visual communication, a facsimile and pictorial image system. The second part contains terminal equipment such as telephone, terminal equipment for data transmission on constitution and constituent of terminal equipment for data transmission, input device and output device, terminal device and up-to-date terminal device.

This book is divided two parts about visual communication and terminal equipment. The first part introduces visual communication, which deals with foundation of visual communication, technique of visual communication, equipment of visual communication, a facsimile and pictorial image system. The second part contains terminal equipment such as telephone, terminal equipment for data transmission on constitution and constituent of terminal equipment for data transmission, input device and output device, terminal device and up-to-date terminal device.

Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

Identifying communities vulnerable to adverse health effects from exposure to wildfire smoke may help prepare responses, increase the resilience to smoke and improve public health outcomes during smoke days. We developed a Community Health-Vulnerability Index (CHVI) based on factors known to increase the risks of health effects from air pollution and wildfire smoke exposures. These factors included county prevalence rates for asthma in children and adults, chronic obstructive pulmonary disease, hypertension, diabetes, obesity, percent of population 65 years of age and older, and indicators of socioeconomic status including poverty, education, income and unemployment. Using air quality simulated for the period between 2008 and 2012 over the continental U.S. we also characterized the population size at risk with respect to the level and duration of exposure to fire-originated fine particulate matter (fire-PM2.5) and CHVI. We estimate that 10% of the population (30.5 million) lived in the areas where the contribution of fire-PM2.5 to annual average ambient PM2.5 was high (>1.5 µg m3) and that 10.3 million individuals experienced unhealthy air quality levels for more than 10 days due to smoke. Using CHVI we identified the most vulnerable counties and determined that these communities experience more smoke exposures in comparison to less vulnerable communities. We describe the development of an index of community vulnerability for the health effects of smoke based o

Security and safety have been key priorities at facilities that manufacture, store, use, or handle hazardous chemicals, after the terrorist attacks on the United States of September 11, 2001. Security improvements may be needed, especially at sites that pose a more attractive target to terrorists due to their economic importance, perceived level of consequences, and other factors. The first step in the process of managing security risks is to identify and analyze the threats and the vulnerabilities facing a facility by conducting a Security Vulnerability Analysis (SVA). The SVA is a systematic process that evaluates the likelihood that a threat against a facility will be successful. It considers the potential severity of consequences to the facility itself, to the surrounding community and on the energy supply chain. The objective of conducting a SVA is to identify security hazards, threats, and vulnerabilities facing a facility, and to evaluate the countermeasures to provide for the protection of the public, workers, national interests, the environment, and the company. With this information security risks can be assessed and strategies can be formed to reduce vulnerabilities as required. SVA is a tool to assist management in making decisions on the need for countermeasures to address the threats and vulnerabilities. The paper provides an overview of fundamental steps of SVA for stationary industrial installations. (author)

Considering the importance of the cost of material and equipment in the overall cost profile of an oil company, which in the case of Petrobras, represents approximately 23% of the total operational cost or 10% of the sales, an organization for the optimization of such costs has been established within Petrobras. Programs are developed aiming at: optimization of life-cycle cost of material and equipment; optimization of industrial processes costs through material development. This paper describes the methodology used in the management of the development programs and presents some examples of concluded and ongoing programs, which are conducted in permanent cooperation with suppliers, technical laboratories and research institutions and have been showing relevant results

The patent concerns a warning and protection system for mobile x-ray equipment used for 'on site' radiography, so that workers in the vicinity of such a working unit can be alerted to its presence. The invention is a local repeater warning system which gives a preliminary warning that energisation of the tubehead is imminent, as well as a switch near the tubehead to abort or inhibit energisation. The latter switch allows personnel caught in the vicinity of the tubehead to prevent energisation. The preliminary warning may be flashing lamps or by a klaxon. The control unit for the equipment may include a monitoring circuit to detect failure of the warning light or klaxon. (U.K.)

The patent concerns a warning and protection system for mobile x-ray equipment used for 'on site' radiography, so that workers in the vicinity of such a working unit can be alerted to its presence. The invention is a local repeater warning system which gives a preliminary warning that energisation of the tubehead is imminent, as well as a switch near the tubehead to abort or inhibit energisation. The latter switch allows personnel caught in the vicinity of the tubehead to prevent energisation. The preliminary warning may be flashing lamps or by a klaxon. The control unit for the equipment may include a monitoring circuit to detect failure of the warning light or klaxon. (U.K.).

This patent describes a tube for irradiation equipment for limiting an emergent beam, with a baseplate, possessing a central aperture, intended for attaching to the equipment, as well as four carrier plates, each of which possesses a limiting edge and a sliding edge located at right angles thereto. The carrier plates are located parallel to the baseplate, the limiting edge of each carrier plate resting against the sliding edge of the adjacent carrier plate and each of the two mutually opposite pairs of carrier plates being displaceable, parallel to the direction of its sliding edges and symmetrically to the center of the transmission aperture, for the purpose of continuously varying the transmission aperture defined by the limiting edges, during which displacement each of the displaced carrier plates carries with it the carrier plate, resting against the limiting edge of the former plate, parallel to the direction of the limiting edge of the latter plate. 8 claims

The invention concerns an improvement of equipment for isotope diagnostics allowing to mark special intensity ranges of the recorded measurements by means of different colors. For undisturbed operation it is of advantage to avoid electric circuits between movable and unmovable parts of the color recorder. According to the invention, long gear wheels of glass fiber-reinforced polyamide are used for these connections. (ORU) [de

End of February 1977 a Soviet Ilyushin-76 heavy freight aircraft landed at Cointrin airport having on board fifty large wire proprtional chambers and associated apparatus, together weighing 10 tons, supplied by the Joint Institute for Nuclear Research, Dubna, USSR. The equipment was for the CERN- Dubna-Munich-Saclay experiment NA4 on deep inelastic muon scattering being set up in the North Area of SPS. See Weekly Bulletin 11/78.

A new labelling system for use on medical equipment dispensers is tested. This system uses one of the objects stored in each unit of the dispenser as the 'label', by attaching it to the front of the dispenser with tape. The new system was compared to conventional written labelling by timing subjects asked to select items from two dispensers. The new system was 27% quicker than the conventional system. Images Fig. 1 PMID:8110335

Nuclear Power Plant (NPP) Operators are challenged with securing reliable supply channels for safety related equipment due to equipment obsolescence. Many Original Equipment Manufacturers (OEMs) have terminated production of spare parts and product life-cycle support. The average component life cycles are much shorter than the NPP design life, which means that replacement components and parts for the original NPP systems are not available for the complete design life of the NPPs. The lack or scarcity of replacement parts adversely affects plant reliability and ultimately the profitability of the affected NPPs. This problem is further compounded when NPPs pursue license renewal and approval for plant-life extension. A reliable and predictable supply of replacement co components is necessary for NPPs to remain economically competitive and meet regulatory requirements and guidelines. Electrical and I and C components, in particular, have short product life cycles and obsolescence issues must be managed pro actively and not reactively in order to mitigate the risk to the NPP to ensure reliable and economic NPP operation. (Author)

This Practical Radiation Technical Manual is one of a series that has been designed to provide guidance on radiological protection for employers, radiation protection officers, managers and other technically competent persons who have responsibility for ensuring the safety of employees working with ionizing radiation. The Manual may be used with the appropriate IAEA Practical Radiation Safety Manuals to provide training, instruction and information for all employees engaged in work with ionizing radiation. Personal protective equipment (PPE) includes clothing or other special equipment that is issued to individual workers to provide protection against actual or potential exposure to ionizing radiations. It is used to protect each worker against the prevailing risk of external or internal exposure in circumstances in which it is not reasonably practicable to provide complete protection by means of engineering controls or administrative methods. Adequate personal protection depends on PPE being correctly selected, fitted and maintained. Appropriate training for the users and arrangements to monitor usage are also necessary to ensure that PPE provides the intended degree of protection effectively. This Manual explains the principal types of PPE, including protective clothing and respiratory protective equipment (RPE). Examples of working procedures are also described to indicate how PPE should be used within a safe system of work. The Manual will be of most benefit if it forms part of a more comprehensive training programme or is supplemented by the advice of a qualified expert in radiation protection. Some of the RPE described in this Manual should be used under the guidance of a qualified expert

Ethical guidelines for conducting research are embedded in the Helsinki declaration of 1964. We contend that these abstract and intentionally universal guidelines need to be appropriated for social and health care research in which purpose and methods often deviate from medical research. The guid......Ethical guidelines for conducting research are embedded in the Helsinki declaration of 1964. We contend that these abstract and intentionally universal guidelines need to be appropriated for social and health care research in which purpose and methods often deviate from medical research...... and problems of vulnerable patients and - at the same time - respect their integrity without exposing them unnecessarily? The article illuminates the interactional construction of roles and relationships and how they affect the contextual construction of vulnerability. In this respect we demonstrate...

Full Text Available The employee who concluded a part-time contract is the employee whose normal working hours, calculated weekly or as monthly average, is lower than the number of normal working hours of a comparable full-time employee. Part-time workers generally have the same legal status as full time workers. In fact, the vulnerability of this category of workers is not necessarily legal but rather economic: income - in proportion to the work performed, may be insufficient to cover the needs of living. However, such vulnerability may also have a certain cultural component: in some societies, professional identity is determined by the length of working hours. Also, part time work may hide many types of indirect discrimination.As a result, the part-time contract requires more than a protective legislation: it requires a strategy. This paper proposes a number of milestones of such a strategy, as well as some concrete de lege ferenda proposals.

Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.

Full Text Available attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft...

The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

Drought causes the highest economic losses among all hydro-meteorological events in Croatia. It is the most frequent hazard, which produces the highest damages in the agricultural sector. The climate assessment in Croatia according to the aridity index (defined as the ratio of precipitation and potential evapotranspiration) shows that the susceptibility to desertification is present in the warm part of the year and it is mostly pronounced in the Adriatic region and the eastern Croatia lowland. The evidence of more frequent extreme drought events in the last decade is apparent. These facts were motivation to study the drought risk assessment in Croatia. One step in this issue is the construction of the vulnerability map. This map is a complex combination of the geomorphologic and climatological inputs (maps) that are presumed to be natural factors which modify the amount of moisture in the soil. In this study, the first version of the vulnerability map is followed by the updated one that additionally includes the soil types and the land use classes. The first input considered is the geomorphologic slope angle calculated from the digital elevation model (DEM). The SRTM DEM of 100 m resolution is used. The steeper slopes are more likely to lose water and to become dryer. The second climatological parameter, the solar irradiation map, gives for the territory of Croatia the maximum irradiation on the coast. The next meteorological parameter that influences the drought vulnerability is precipitation which is in this assessment included through the precipitation variability expressed by the coefficient of variation. Larger precipitation variability is related with the higher drought vulnerability. The preliminary results for Croatia, according to the recommended procedure in the framework of Drought Management Centre for Southeastern Europe (DMCSEE project), show the most sensitive areas to drought in the southern Adriatic coast and eastern continental lowland.

for future afforestation. However, the presence of long vessels makes it difficult to assess xylem vulnerability to embolism in these species. Thanks to the development of a flow centrifuge equipped with a large rotor, we quantified (i) the between species variability of embolism resistance in four native...

Full Text Available Purpose. Physical expansion of urban areas and cities is of great importance nowadays. Irreparable damages will thus be caused by lack of proper planning against natural disasters. Crisis management will therefore guide through prevention, preparedness, disaster relief, and recovery by planning an appropriate program. Methodology. Principal processes of crisis management against earthquake in Iran were evaluated and discussed. Multicriteria earthquake crisis management was then proposed by means of Analytic Hierarchy Process (AHP. Vulnerability of 19 urban areas in Qazvin city was studied and analyzed as a case study. Three main criteria were considered as “physical dimensions and physical vulnerability texture,” “the amount of urban texture responsibility to aid after crisis,” and “possibility of city reversibility after the crisis.” These criteria were divided into 20 subcriteria which were prioritized by a questionnaire survey. Findings. “High population density,” “urban texture of old and repairable buildings,” “lack of relief and medical services,” “a few organic texture areas,” “sidewalks with less than 6 meters width in the region,” and “lack of open spaces in the area” were concluded to be the most important reasons causing high vulnerability of urban texture in Qazvin city.

Governments worldwide do not adequately protect their limited freshwater systems and therefore place freshwater functions and attendant ecosystem services at risk. The best available scientific evidence compels enhanced protections for freshwater systems, especially for impermanent streams and wetlands outside of floodplains that are particularly vulnerable to alteration or destruction. New approaches to freshwater sustainability -- implemented through scientifically informed adaptive management -- are required to protect freshwater systems through periods of changing societal needs. One such approach introduced in the US in 2015 is the Clean Water Rule, which clarified the jurisdictional scope for federally protected waters. However, within hours of its implementation litigants convinced the US Court of Appeals for the Sixth Circuit to stay the rule, and the subsequently elected administration has now placed it under review for potential revision or rescission. Regardless of its outcome at the federal level, policy and management discussions initiated by the propagation of this rare rulemaking event have potential far-reaching implications at all levels of government across the US and worldwide. At this timely juncture, we provide a scientific rationale and three policy options for all levels of government to meaningfully enhance protection of these vulnerable waters. A fourth option, a 'do-nothing' approach, is wholly inconsistent with the well-established scientific evidence of the importance of these vulnerable waters.

Minorities are in an inferior position in society and therefore vulnerable in many aspects. This study analyzes legislative vulnerability and aims to categorize as "weak" or "strong" the protection conferred by law to the following minorities: elderly, disabled, LGBT, Indians, women, children/ adolescents and black people. In order to do so, it was developed a documental research in 30 federal laws in which legal provisions were searched to protect minorities. Next, the articles were organized in the following categories: civil, criminal, administrative, labor and procedural, to be analyzed afterwards. Legal protection was considered "strong" when there were legal provisions that observed the five categories and "weak" when it did not meet this criterion. It was noted that six groups have "strong" legislative protection, which elides the assertion that minorities are outside the law. The exception is the LGBT group, whose legislative protection is weak. In addition, consecrating rights through laws strengthens the institutional channels for minorities to demand their rights. Finally, it was observed that the legislative protection granted tominorities is not homogeneous but rather discriminatory, and there is an interference by the majority group in the rights regulation of vulnerable groups.

This paper examines the dynamics of poverty and vulnerability in Haiti using various data sets. As living conditions survey data are not comparable in this country, we first propose to use the three rounds of the Demographic Health Survey (DHS) available before the earthquake. Decomposing household assets changes into age and cohort effects, we use repeated cross-section data to identify a...

Environmental change can cause regime shifts in ecosystems, potentially threatening ecosystem services. It is unclear if the degradation status of ecosystems correlates with their vulnerability to environmental change, and thus the risk of future regime shifts. We assessed resilience in acidified (degraded) and circumneutral (undegraded) lakes with long-term data (1988–2012), using time series modeling. We identified temporal frequencies in invertebrate assemblages, which identifies groups of species whose population dynamics vary at particular temporal scales. We also assessed species with stochastic dynamics, those whose population dynamics vary irregularly and unpredictably over time. We determined the distribution of functional feeding groups of invertebrates within and across the temporal scales identified, and in those species with stochastic dynamics, and assessed attributes hypothesized to contribute to resilience. Three patterns of temporal dynamics, consistent across study lakes, were identified in the invertebrates. The first pattern was one of monotonic change associated with changing abiotic lake conditions. The second and third patterns appeared unrelated to the environmental changes we monitored. Acidified and the circumneutral lakes shared similar levels and patterns of functional richness, evenness, diversity, and redundancy for species within and across the observed temporal scales and for stochastic species groups. These similar resilience characteristics suggest that both lake types did not differ in vulnerability to the environmental changes observed here. Although both lake types appeared equally vulnerable in this study, our approach demonstrates how assessing systemic vulnerability by quantifying ecological resilience can help address uncertainty in predicting ecosystem responses to environmental change across ecosystems.

Although climate change is global threat, developing countries have been identified as most vulnerable owing to their low adaptive capacities. In Nigeria, while the impacts of climate cut across diverse sectors, agriculture remains the most susceptible due to the predominance of rainfed agriculture. This paper examines ...

23 oct. 2007 ... Working in several villages belonging to four communities in the region of Thiès, the project will put in place an observatory of climate change, sensitize local actors, and identify and implement adaptation strategies to improve the living conditions of vulnerable populations, or at least slow down their ...

and its population. Not least the continued expansion of a modern (Danish) way of life and its priorities concerning health, housing, social welfare, and economic politics have in different periods of time framed the kinds of vulnerabilities that have been identified based on changing professional...

Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users’ vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain. PMID:23761527

Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users' vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain.

A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

sites, including the Great Barrier Reef and Queensland Wet Tropics. Other sites at risk include Kakadu wetlands, south-west Australia and alpine areas; Risks to major infrastructure are likely to increase. By 2030, design criteria for extreme events are very likely to be exceeded more frequently. Risks include failure of floodplain protection and urban drainage/sewerage, increased storm and fire damage, and more heat waves causing more deaths and more black-outs; Production from agriculture and forestry is projected to decline by 2030 over much of southern and eastern Australia, due to increased drought and fire. Vulnerability is likely to increase in many sectors, but this depends on adaptive capacity; Most human systems have considerable adaptive capacity. The region has well developed economies, extensive scientific and technical capabilities, disaster mitigation strategies, and biosecurity measures. However, there are likely to be considerable cost and institutional constraints to implementation of adaptation options. Some Indigenous communities have low adaptive capacity. Water security and coastal communities are the most vulnerable sectors; Natural systems have limited adaptive capacity. Projected rates of climate change are very likely to exceed rates of evolutionary adaptation in many species. Habitat loss and fragmentation are very likely to limit species migration in response to shifting climatic zones; Vulnerability is likely to rise due to an increase in extreme events. Economic damage from extreme weather is very likely to increase and provide major challenges for adaptation; Vulnerability is likely to be high by 2050 in a few identified hotspots. These include the Great Barrier Reef, eastern Queensland, the south-west, Murray-Darling Basin, the alps and Kakadu wetland

Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

We present a set of indicators of vulnerability and capacity to adapt to climate variability, and by extension climate change, derived using a novel empirical analysis of data aggregated at the national level on a decadal timescale. The analysis is based on a conceptual framework in which risk is viewed in terms of outcome, and is a function of physically defined climate hazards and socially constructed vulnerability. Climate outcomes are represented by mortality from climate-related disasters, using the emergency events database data set, statistical relationships between mortality and a shortlist of potential proxies for vulnerability are used to identify key vulnerability indicators. We find that 11 key indicators exhibit a strong relationship with decadally aggregated mortality associated with climate-related disasters. Validation of indicators, relationships between vulnerability and adaptive capacity, and the sensitivity of subsequent vulnerability assessments to different sets of weightings are explored using expert judgement data, collected through a focus group exercise. The data are used to provide a robust assessment of vulnerability to climate-related mortality at the national level, and represent an entry point to more detailed explorations of vulnerability and adaptive capacity. They indicate that the most vulnerable nations are those situated in sub-Saharan Africa and those that have recently experienced conflict. Adaptive capacity - one element of vulnerability - is associated predominantly with governance, civil and political rights, and literacy. (author)

Full Text Available Most of the world’s population is concentrated in accumulated spaces in the form of cities, making the concept of urban planning a significant issue for consideration by decision makers. Urban vulnerability is a major issue which arises in urban management, and is simply defined as how vulnerable various structures in a city are to different hazards. Reducing urban vulnerability and enhancing resilience are considered to be essential steps towards achieving urban sustainability. To date, a vast body of literature has focused on investigating urban systems’ vulnerabilities with regard to natural hazards. However, less attention has been paid to vulnerabilities resulting from man-made hazards. This study proposes to investigate the physical vulnerability of buildings in District 6 of Tehran, Iran, with respect to intentional explosion hazards. A total of 14 vulnerability criteria are identified according to the opinions of various experts, and standard maps for each of these criteria have been generated in a GIS environment. Ultimately, an ordered weighted averaging (OWA technique was applied to generate vulnerability maps for different risk conditions. The results of the present study indicate that only about 25 percent of buildings in the study area have a low level of vulnerability under moderate risk conditions. Sensitivity analysis further illustrates the robustness of the results obtained. Finally, the paper concludes by arguing that local authorities must focus more on risk-reduction techniques in order to reduce physical vulnerability and achieve urban sustainability.

We present a set of indicators of vulnerability and capacity to adapt to climate variability, and by extension climate change, derived using a novel empirical analysis of data aggregated at the national level on a decadal timescale. The analysis is based on a conceptual framework in which risk is viewed in terms of outcome, and is a function of physically defined climate hazards and socially constructed vulnerability. Climate outcomes are represented by mortality from climate-related disasters, using the emergency events database data set, statistical relationships between mortality and a shortlist of potential proxies for vulnerability are used to identify key vulnerability indicators. We find that 11 key indicators exhibit a strong relationship with decadally aggregated mortality associated with climate-related disasters. Validation of indicators, relationships between vulnerability and adaptive capacity, and the sensitivity of subsequent vulnerability assessments to different sets of weightings are explored using expert judgement data, collected through a focus group exercise. The data are used to provide a robust assessment of vulnerability to climate-related mortality at the national level, and represent an entry point to more detailed explorations of vulnerability and adaptive capacity. They indicate that the most vulnerable nations are those situated in sub-Saharan Africa and those that have recently experienced conflict. Adaptive capacity - one element of vulnerability - is associated predominantly with governance, civil and political rights, and literacy. (author)

Full text: The Scientific Equipment Division consists of the Design Group and the Mechanical Workshop. The activity of the Division includes the following: - designing of devices and equipment for experiments in physics, their mechanical construction and assembly. In particular, there are vacuum chambers and installations for HV and UHV; - maintenance and upgrading of the existing installations and equipment in our Institute; - participation of our engineers and technicians in design works, equipment assembly and maintenance for experiments in foreign laboratories. The Design Group is equipped with PC-computers and AutoCAD graphic software (release 2000 and Mechanical Desktop 4.0) and a AO plotter, what allows us to make drawings and 2- and 3-dimensional mechanical documentation to the world standards. The Mechanical Workshop can offer a wide range of machining and treatment methods with satisfactory tolerances and surface quality. It offers the following possibilities: - turning - cylindrical elements of a length up to 2000 mm and a diameter up to 400 mm, and also disc-type elements of a diameter up to 600 mm and a length not exceeding 300 mm; - milling - elements of length up to 1000 mm and gear wheels of diameter up to 300 mm; - grinding - flat surfaces of dimensions up to 300 mm x 1000 mm and cylindrical elements of a diameter up to 200 mm and a length up to 800 mm; - drilling - holes of a diameter up to 50 mm; - welding - electrical and gas welding, including TIG vacuum-tight welding; - soft and hard soldering; - mechanical works including precision engineering; - plastics treatment - machining and polishing using diamond milling, modelling, lamination of various shapes and materials, including plexiglas, scintillators and light-guides; - painting - paint spraying with possibility of using furnace-fred drier of internal dimensions of 800 mm x 800 mm x 800 mm. Our workshop posses CNC milling machine which can be used for machining of work-pieces up to 500 kg

More than 60% of the electrical power of Belgium is generated by seven PWR nuclear power plants. For three of them, the electro-mechanical equipment had to be reassessed after ten years of operation, because the seismic requirements were upgraded from 0.1 g to 0.17 g free field ground acceleration. The seismic requalification of the active equipment was a critical problem as the classical methods were too conservative. The approach based on the use of the past experience on the seismic behavior of nonnuclear equipment, chosen and developed by the SQUG, had to be transposed to the Belgian N.P.P. The decision of the accept-ability of equipment relies heavily on the aseismatic capacity of anchorage. The Electrical Power Research Institute (EPRI) developed the procedure and guideline for the demonstration of the aseismatic adequacy of equipment anchorage in a cost-effective and consistent manner, to support the decision by Seismic Review Team. The field inspection procedure to identify the type of fasteners and detect their possible defects and the verification procedure developed to calculate the aseismatic capacity of equipment anchorage on the strength of fasteners, the aseismatic capacity of anchorage and the comparison of the capacity with the demand are reported. (K.I.)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilitiesidentified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts

The availability of family can be considered a protective factor for aging well. In this article, we examine to what extent the family situation of older people creates vulnerability with respect to their quality of life. Because not everyone is vulnerable to the same degree, we try to identify the

company in vulnerable countries with a special focus on Brazil. The identified ethical considerations are related to: The transnational company’s interpretation of its regulatory and ethical obligations for development and use of its hazardous products in vulnerable countries, path dependency and path...

Mining face equipment includes drilling advance wells, drilling using explosives on the contour bore holes, loading and transporting the crushed mass, drilling reinforcement shafts, injecting reinforcement compounds and moving the timber. Camouflet explosives are used to form relaxed rock stress beyond the mining area to decrease costs of reinforcing the mining area by using nonstressed rock in the advance well as support. The strengthening solution is injected through advanced cementing wells before drilling the contour bores as well as through radial cementing wells beyond the timbers following loading and transport of the mining debris. The advance well is 50-80 m.

The monitoring equipment is used to determine the remainder from combustion (ash slack) of coal in wagons designed for power stations. Next to the rails, a neutron source (252 Cf, 241 Am/Be) is situated, which irradiates the coal with neutrons at a known dose, which produces the reaction 27 Al (n ..gamma..) Al 28. The aluminium content is a measure of the remainder. The 1.78 MeV energy is measured downstream of the rail with a detector. The neutron source can only act in the working position of a loaded wagon.

Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper

Drought is a recurrent extreme climate event that can cause crop damage and yield loss, thereby inflicting negative socioeconomic impacts all over the world. According to several climate studies, drought events may be more frequent and more severe as global warming progresses. As an agricultural country, the Philippines is highly susceptible to adverse impacts of drought using remotely sensed information and geographic processing techniques. An agricultural drought vulnerability map identifying croplands that are least vulnerable, moderately vulnerable, and most vulnerable to crop water-related stress, was developed. Vulnerability factors, including land use system, irrigation support. Available soil-water holding capacity, as well as satellite-derived evapotranspiration and rainfall, were taken into consideration in classifying and mapping agricultural drought vulnerability at a national level. (author)

Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper.

Full Text Available Rapid hydropower development is occurring in China's Yunnan province in response to increasing clean energy demands, exposing potential vulnerabilities of the area's ecosystems, communities, and geopolitical systems. Here, we present original data on the cultures, economics, hydro-politics, and environments of the Nu River basin, based on household surveys, analysis of geopolitical events, and hydrological, hydraulic, and landscape modeling. We identify sources of vulnerability and investigate relationships among biophysical, socioeconomic, and geopolitical elements that contribute to vulnerability. Our results illustrate the role of geographic isolation in intensifying vulnerability to hydropower development and how access to information, data uncertainty, and geopolitics influence the vulnerability of people and the environment. We emphasize specific needs for developing support mechanisms for social, ecological, and political groups that are vulnerable to hydropower development.

steps can be taken in order to make it more resilient. Performing such an analysis of network break-ups requires consideration of the network as a whole, ideally identifying all the cases generated by simultaneous closure of multiple links and evaluating them using various criteria. The spatial distribution of settlements, important companies and the overall population in the nodes of the network are several factors, apart from the topology of the network which could be taken into account when computing vulnerability indices and identifying the weakest links and/or weakest link combinations. However, even for small networks (i.e., hundreds of nodes and links), the problem of break-up identification becomes extremely difficult to resolve. The naive approaches of the brute force examination consequently fail and more elaborated algorithms have to be applied. We address the problem of evaluating the vulnerability of road networks in our work by simulating the impacts of the simultaneous closure of multiple roads/links. We present an ongoing work on a sophisticated algorithm focused on the identification of network break-ups and evaluating them by various criteria.

Earthquakes have probably been the most deadly form of natural disaster in the past century. Diversity of earthquake specifications in terms of magnitude, intensity and frequency at the semicontinental scale has initiated various kinds of disasters at a regional scale. Additionally, diverse characteristics of countries in terms of population size, disaster preparedness, economic strength and building construction development often causes an earthquake of a certain characteristic to have different impacts on the affected region. This research focuses on the appropriate criteria for identifying the severity of major earthquake disasters based on some key observed symptoms. Accordingly, the article presents a methodology for identification and relative quantification of severity of earthquake disasters. This has led to an earthquake disaster vulnerability model at the country scale. Data analysis based on this model suggested a quantitative, comparative and meaningful interpretation of the vulnerability of concerned countries, and successfully explained which countries are more vulnerable to major disasters.

The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

Full Text Available The aim of the paper is to generate a composite map for decision makers using selected factors, mainly of natural character, causing floods. In the analyses, some of the causative factors for flooding in a catchment area are taken into account, such as soil type, precipitation, land use, size of catchment and basin slope. A case study of flood vulnerability identification in the Bodva river basin in eastern Slovakia is employed to illustrate the different approaches. A geographical information system (GIS is integrated with multicriteria analysis (MCA in the paper. The identification of flood vulnerability consists of two basic phases. Firstly, the effective factors causing floods are identified. Secondly several approaches to MCA in a GIS environment are applied and these approaches are evaluated in order to prepared flood vulnerability map.

The book presents results of CLUVA (CLimate Change and Urban Vulnerability in Africa), a large European Commission funded research project (2010-2013). The project aimed to develop a better understanding of the risks and impacts of climate change related hazards to African cities, assess their vulnerability to these risks, and identify innovative strategies for planning and governance to increase their resilience. For the first time, a systematic and groundbreaking study of this kind was applied in an inter- and trans-disciplinary approach. CLUVA was unique in that it combined: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences and qualitative approaches of the social sciences; a novel multi-risk modeling methodology; strategic approaches to urban and green infrastructure planning with neighborhood perspectives of adaptation. The book broadly follows the approach taken in the CLUVA project. First, the co...

A program has been completed to assess, renovate and document tank farm field equipment year 2000 compliance. A communication plan has also been prepared (see section 8.0). The objective of the program was to assure that no adverse effects occur in tank farm operations as a result of equipment malfunction due to the advent of year 2000. The purposes of this document are to: describe the process used to assess field equipment; document items found to be compliant; document items found to be non-compliant including options for making the equipment year 2000 functional and/or tolerant; describe location and management of field equipment year 2000 documentation; assess overall vulnerability of TWRS field equipment with regard to year 2000 problems and describe plans to communicate year 2000 equipment review results and corrective actions

Tibet is especially vulnerable to climate change due to the relatively rapid rise of temperature over past decades. The effects on mortality and morbidity of extreme heat in Tibet have been examined in previous studies; no heat adaptation initiatives have yet been implemented. We estimated heat vulnerability of urban and rural populations in 73 Tibetan counties and identified potential areas for public health intervention and further research. According to data availability and vulnerability factors identified previously in Tibet and elsewhere, we selected 10 variables related to advanced age, low income, illiteracy, physical and mental disability, small living spaces and living alone. We separately created and mapped county-level cumulative heat vulnerability indices for urban and rural residents by summing up factor scores produced by a principal components analysis (PCA). For both study populations, PCA yielded four factors with similar structure. The components for rural and urban residents explained 76.5 % and 77.7 % respectively of the variability in the original vulnerability variables. We found spatial variability of heat vulnerability across counties, with generally higher vulnerability in high-altitude counties. Although we observed similar median values and ranges of the cumulative heat vulnerability index values among urban and rural residents overall, the pattern varied strongly from one county to another. We have developed a measure of population vulnerability to high temperatures in Tibet. These are preliminary findings, but they may assist targeted adaptation plans in response to future rapid warming in Tibet.

Full Text Available The degree of social vulnerability may vary according to the conditions and backgrounds of different locations, yet spatial clustering phenomena may exist when nearby spatial units exhibit similar characteristics. This study applied spatial autocorrelation statistics to analyze the spatial association of vulnerability among townships in Taiwan. The vulnerability was first assessed on the basis of a social vulnerability index that was constructed using Fuzzy Delphi and analytic hierarchy process methods. Subsequently, the corresponding indicator variables were applied to calculate standardized vulnerability assessment scores by using government data. According to the results of the vulnerability assessment in which T scores were normalized, the distribution of social vulnerabilities varied among the townships. The scores were further analyzed using spatial autocorrelation statistics for spatial clustering of vulnerability distribution. The Local G statistic identified 42 significant spatial association pockets, whereas the Global G statistic indicated no spatial phenomenon of clustering. This phenomenon was verified and explained by applying Moran's I statistics to examine the homogeneity and heterogeneity of spatial associations. Although both statistics were originally designed to identify the existence of spatial clustering, they serve diverse purposes, and the results can be compared to obtain additional insights into the distribution patterns of social vulnerability.

Elite athletes require the most advanced sports equipment to maintain their competitive edge, but manufacturers cannot always satisfy these athletes' specific equipment needs. Sport involvement can influence sports-equipment selections and is described as the process by which individuals rely on attitudes and belief systems to make sports-related consumption decisions. This study involved semistructured interviews with 5 elite Parasport athletes to identify and analyze the role of sport involvement in their selection of sports equipment. The results revealed that the athletes identified product limitations, created a collaborative environment, and promoted a culture of innovation to develop new sports products and address existing limitations. Theoretical and practical implications are discussed.

Full Text Available Recent flood events in Ireland and particularly in County Cork have caused significant disruption to health service provisions, interruption of water and power supplies, and damage to roads and other transportation infrastructure, affecting the lives of hundreds of thousands of people over a prolonged period of weeks. These events clearly reveal- the vulnerability of the critical infrastructure to flooding and the dependence of society on critical infrastructure. In order to reduce the flood vulnerability and increase the resilience of the critical infrastructure networks in the future, detailed evidence-based analysis and assessment is essential. To this end a case study has been carried out on Cork City which analyses this vulnerability as it was in 2009, and as it is currently, and identifies adaptation options to reduce the future vulnerability of critical infrastructure to flooding and to build a more resilient society. This paper describes the storyline approach and CIrcle tool and their application to Cork City which focused on the analysis of the flood vulnerability of critical infrastructure and the impacts of failure of the infrastructure for other critical functions and on society.

It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

Full Text Available Intestinal stomas cause transformations in the body and create specific and continuous needs for care that imply in hospitalization and surgeries. In this context, we applied the concept of family vulnerability in order to identify the vulnerability of the family living with a child who has intestinal stoma. It is a qualitative study which interviewed the mothers of children with this chronic condition. We used narrative analysis based on the concept of family vulnerability. The results display that the family has gone through previous noteworthy experiences associated with the child’s condition. The family cares for the child on their own and seeks ways to control the situation and regain autonomy, hoping for stoma reversal. Based on the concept of vulnerability, we observed that these families can be considered vulnerable, for they experience threats to their autonomy, but are moved by the hope of reversal and intestinal tract reconstruction. doi: 10.5216/ree.v16i2.26639.

Understanding the present and future distribution of different climate change impacts and vulnerability to climate change is a central subject in the context of climate justice and international climate policy. Commonly, it is claimed that poor countries that contributed little to anthropogenic climate change are those most affected and most vulnerable to climate change. Such statements are backed by a number of global-scale vulnerability studies, which identified poor countries as most vulnerable. However, some studies have challenged this view, likewise highlighting the high vulnerability of richer countries. Overall, no consensus has been reached so far about which concept of vulnerability should be applied and what type of indicators should be considered. Furthermore, there is little agreement which specific countries are most vulnerable. This is a major concern in view of the need to inform international climate policy, all the more if such assessments should contribute to allocate climate adaptation funds as was invoked at some instances. We argue that next to the analysis of who is most vulnerable, it is also important to better understand and compare different vulnerability profiles assessed in present global studies. We perform a systematic literature review of global vulnerability assessments with the scope to highlight vulnerability distribution patterns. We then compare these distributions with global risk distributions in line with revised and adopted concepts by most recent IPCC reports. It emerges that improved differentiation of key drivers of risk and the understanding of different vulnerability profiles are important contributions, which can inform future adaptation policies at the regional and national level. This can change the perspective on, and basis for distributional issues in view of climate burden share, and therefore can have implications for UNFCCC financing instruments (e.g. Green Climate Fund). However, in order to better compare

Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.

Marine species are being impacted by climate change and ocean acidification, although their level of vulnerability varies due to differences in species' sensitivity, adaptive capacity and exposure to climate hazards. Due to limited data on the biological and ecological attributes of many marine species, as well as inherent uncertainties in the assessment process, climate change vulnerability assessments in the marine environment frequently focus on a limited number of taxa or geographic ranges. As climate change is already impacting marine biodiversity and fisheries, there is an urgent need to expand vulnerability assessment to cover a large number of species and areas. Here, we develop a modelling approach to synthesize data on species-specific estimates of exposure, and ecological and biological traits to undertake an assessment of vulnerability (sensitivity and adaptive capacity) and risk of impacts (combining exposure to hazards and vulnerability) of climate change (including ocean acidification) for global marine fishes and invertebrates. We use a fuzzy logic approach to accommodate the variability in data availability and uncertainties associated with inferring vulnerability levels from climate projections and species' traits. Applying the approach to estimate the relative vulnerability and risk of impacts of climate change in 1074 exploited marine species globally, we estimated their index of vulnerability and risk of impacts to be on average 52 ± 19 SD and 66 ± 11 SD, scaling from 1 to 100, with 100 being the most vulnerable and highest risk, respectively, under the 'business-as-usual' greenhouse gas emission scenario (Representative Concentration Pathway 8.5). We identified 157 species to be highly vulnerable while 294 species are identified as being at high risk of impacts. Species that are most vulnerable tend to be large-bodied endemic species. This study suggests that the fuzzy logic framework can help estimate climate vulnerabilities and risks

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

The International Union for Conservation of Nature (IUCN) announced on 9 September that it will develop a new Red List of Ecosystems that will identify which ecosystems are vulnerable or endangered. The list, which is modeled on the group's Red List of Threatened Species™, could help to guide conservation activities and influence policy processes such as the Convention on Biological Diversity, according to the group. “We will assess the status of marine, terrestrial, freshwater, and subterranean ecosystems at local, regional, and global levels,” stated Jon Paul Rodriguez, leader of IUCN's Ecosystems Red List Thematic Group. “The assessment can then form the basis for concerted implementation action so that we can manage them sustainably if their risk of collapse is low or restore them if they are threatened and then monitor their recovery.”

Preliminary attempts to develop models for nuclear regulatory vulnerability assessment of nuclear power plants are presented. Development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities to external and internal threats. In the situation where different and hidden threat sources are dispersed throughout the world, the assessment of security and safe operation of nuclear power plants is very important. Capability to evaluate plant vulnerability to different kinds of threats, like human and natural occurrences and terrorist attacks and preparation of emergency response plans and estimation of costs are of vital importance for assurance of national security. On the basis of such vital insights, nuclear operators and nuclear regulatory bodies could plan and optimise changes in oversight procedures, organisations, equipment, hardware and software to reduce risks taking into account security and safety of nuclear power plants operation, budget, manpower, and other limitations. Initial qualitative estimations of adapted assessments for nuclear applications are shortly presented. (author)

. This concept is a great tool for policy makers to help managing their action and taking into account climate change (McFadden, et al. 2006). However, in those approaches, vulnerability is the output itself (cost of effective impacts, geomorphologic impacts…), but is not integrated it in a risk analysis. Furthermore, those studies emerged from a climatic perspective, which leads to consider climate change as a hazard or pressure whereas risk studies commonly consider hazards such as erosion and flooding, where climate change modifies the drivers of the hazard. 2) The natural hazards and socio economic perspectives In order to reduce impacts of natural hazards, decision makers need a complete risk assessment (probability of losses). Past studies on natural risks (landslide, earthquake...) highlighted the pertinence of defining risk as a combination of : (1)hazard occurrence and intensity, (2) exposition and (3)vulnerability of assets and population to this hazard (e.g. Douglas. 2007, Sarewitz, et al. 2003). Following the Renn and Klinke risk assessment frame, high uncertainties associated with coastal risks considering climatic and anthropic change highlights the importance of working on that concept of "vulnerability" (Klinke and Renn. 2002). Past studies on vulnerability assessment showed a frequently mentioned gap between "impact based" and "human based" points of view. It is nowadays a great issue for natural risk sciences. Many research efforts in FP7 projects such as MOVE and ENSURE focus on integrating the different dimensions of vulnerability (Turner, et al. 2003, Birkmann. 2006). Coastal risk studies highlight another issue of concern. We previously detailed the different use of the term "vulnerability" in the coastal context, quite different of the "natural risk's" use. Interaction of social, economic and physical sciences is considered within two french research projects (Vulsaco, Miseeva), in order to identify the vulnerability of a system to flooding or

The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

This special report discusses the impact of globalization, patterns of migration in Southeast Asia, gender issues in migration, the links between migration and HIV/AIDS, and spatial mobility and social networks. Migrants are particularly marginalized in countries that blame migrants for transmission of infectious and communicable diseases and other social ills. Effective control of HIV/AIDS among migrant and native populations requires a multisectoral approach. Programs should critically review the privatization of health care services and challenge economic models that polarize the rich and the poor, men and women, North and South, and migrant and native. Programs should recognize the equality between locals and migrants in receipt of health services. Countermeasures should have input from migrants in order to reduce the conditions that increase vulnerability to HIV/AIDS. Gender-oriented research is needed to understand women's role in migration. Rapid assessment has obscured the human dimension of migrants' vulnerability to HIV. Condom promotion is not enough. Migration is a major consequence of globalization, which holds the promise, real or imagined, of prosperity for all. Mass migration can be fueled by explosive regional developments. In Southeast Asia, migration has been part of the process of economic development. The potential to emigrate increases with greater per capita income. "Tiger" economies have been labor importers. Safe sex is not practiced in many Asian countries because risk is not taken seriously. Migrants tend to be used as economic tools, without consideration of social adjustment and sex behavior among singles.

Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

The word in longwall components is big, and these larger components have price tags to match. The logic behind the greater investment is that it will yield high production rates and good uptime statistics. This is true in most cases. More important than single-shift tonnage records, average shift production continues to climb upwards. This paper reports on the quality, and more significantly, the quantity of service supplied for long-wall equipment, which has reached levels that would have been seen as unachievable when longwall mining was first introduced in the U.S. The school of thought then was that longwall would increase productivity in part by reducing the number of production units and thus reducing the number of personnel employed underground. The expectation of fewer employees turned out to be unrealistic. That was probably one reason that some early attempts to install longwall system looked more like failures than vision of the future

In many types of reactor fuel charging equipment, tongs or a grab, attached to a trolley, housed in a guide duct, can be used for withdrawing from the core a selected spent fuel assembly or to place a new fuel assembly in the core. In these facilities, the trolley may have wheels that roll on rails in the guide duct. This ensures the correct alignment of the grab, the trolley and fuel assembly when this fuel assembly is being moved. By raising or lowering such a fuel assembly, the trolley can be immerged in the coolant bath of the reactor, whereas at other times it can be at a certain level above the upper surface of the coolant bath. The main object of the invention is to create a fuel handling apparatus for a sodium cooled reactor with bearings lubricated by the sodium coolant and in which the contamination of these bearings is prevented [fr

Full Text Available This article analysed vulnerability of smallholder agriculture to climate variability, particularly the alternating incidences of drought and heavy precipitation events in Ghana. Although there is an unmet need for understanding the linkages between climate change and livelihoods, the urgent need for climate change adaptation planning (CCAP in response to climate change makes vulnerability assessment even more compelling in development research. The data for analysis were collected from two complementary studies. These included a regional survey in the Upper West Region and an in-depth study in three selected communities in the Sissala East District. The results showed that smallholder agriculture is significantly vulnerable to climate variability in the region and that three layers of vulnerability can be identified in a ladder of vulnerability. Firstly, farmers are confronted with the double tragedy of droughts and heavy precipitation events, which adversely affect both crops and livestock. Secondly, farmers have to decide on crops for adaptation, but each option – whether indigenous crops, new early-maturing crops or genetically modified crops – predisposes farmers to a different set of risks. Finally, the overall impact is a higher-level vulnerability, namely the risk of total livelihood failure and food insecurity. The article recommended CCAP and an endogenous development (ED approach to addressing agriculture vulnerability to climate variability within the framework of decentralisation and local governance in Ghana. Keywords: Climate variability; agriculture; vulnerability; endogenous development; Ghana

The performance evaluation of space heating equipment for a geothermal application is generally considered from either of two perspectives: (a) selecting equipment for installation in new construction, or (b) evaluating the performance and retrofit requirements of an existing system. With regard to new construction, the procedure is relatively straightforward. Once the heating requirements are determined, the process need only involve the selection of appropriately sized hot water heating equipment based on the available water temperature. It is important to remember that space heating equipment for geothermal applications is the same equipment used in non-geothermal applications. What makes geothermal applications unique is that the equipment is generally applied at temperatures and flow rates that depart significantly from traditional heating system design. This chapter presents general considerations for the performance of heating equipment at non-standard temperature and flow conditions, retrofit of existing systems, and aspects of domestic hot water heating.

Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

In the context of domino effects, vulnerability analysis of chemical and process plants aims to identify and protect installations which are relatively more susceptible to damage and thus contribute more to the initiation or propagation of domino effects. In the present study, we have developed a methodology based on graph theory for domino vulnerability analysis of hazardous installations within process plants, where owning to the large number of installations or complex interdependencies, the application of sophisticated reasoning approaches such as Bayesian network is limited. We have taken advantage of a hypothetical chemical storage plant to develop the methodology and validated the results using a dynamic Bayesian network approach. The efficacy and out-performance of the developed methodology have been demonstrated via a real-life complex case study. - Highlights: • Graph theory is a reliable tool for vulnerability analysis of chemical plants as to domino effects. • All-closeness centrality score can be used to identify most vulnerable installations. • As for complex chemical plants, the methodology outperforms Bayesian network.

Generic Letter 88-20, Supplement No. 1 (Ref. 1), issued by the Nuclear Regulatory Commission (NRC) requested all licensees holding operating licenses and construction permits for nuclear power reactor facilities to perform Individual Plant Examinations (IPE) of their plant(s) for severe accident vulnerabilities and to submit the results to the Commission. This paper summarizes the major Front-End (Level-1 PRA) and Back-End (Level-2 PRA) insights gained from the Millstone Unit 1 (MP-1) IPE study. No major plant vulnerabilities have been identified from a Front-End perspective. The Back-End analysis, however, has identified two potential containment vulnerabilities during postulated events that progress beyond the Design Basis Accidents (DBAs), namely, (1) MP-1 is dominated by early source term releases that would occur within a six-hour time frame from time of accident initiation, or reactor trip, and (2) MP-1 containment is somewhat vulnerable to leak-type failure through the drywell head. As a result of the second finding, a recommendation currently under evaluation, has been made to increase the drywell head bolt's preload from 54 Kips to resist the containment design pressure value (62 psig)

This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

Full Text Available Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.

AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.

Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.

Most equipment in Chinese coal mines consists of machinery and equipment produced in the 1950s; the efficiency of 4-62, CTD-57 and 70B/sub 2/ ventilators is 15% lower than that of new ones; that of SSM and AYaP pumps, 10% lower than of modern ones. Equipment renovation is done in three ways: replacing obsolete equipment with new equipment of the same type; improving the performance of existing equipment by introducing efficiency and reconstruction; and replacing obsolete equipment with advanced equipment. It is indicated that the second way, for example, replacement of 4-62 ventilator blades with a maximum efficiency of 73% by 4-72 ventilator blades raises its efficiency to 90%. Replacing the 8DA-8x3 water pump, having a maximum efficiency of 63%, with the 200D 43x3 pump with a maximum efficiency of 78%, enables an electricity savings of 7000 yuan per year, which exceeds all replacement costs (600 yuan). The need to improve equipment maintenance and preventive work to increase equipment service life and to introduce new techniques and efficiency is noted.

for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies VulnerableVulnerable Not Vulnerable b. Illegal query

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

Maps of risk for individual environmental aspects within the protection zone of the Czech part of the Druzba crude oil pipeline (505.7 km) were developed based on a modified 'H and V index' method. Risk data were added into a GIS of the Druzba pipeline so that the system could be used as conceptual material in the field of environmental protection (a base for the new SCADA system). Considered environmental aspects were assessed in terms of their vulnerability. The criteria were defined as the vulnerability of the aquatic environment (surface waters and ground waters), the vulnerability of soil environment and the vulnerability of biotic components of the environment. (authors)

East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

.... The increasing dependence of government and industry on information technology has created critical vulnerabilities that can be exploited by degrading or destroying the use of information systems...

Purpose: To identify and analyse the hotel sector's vulnerabilities that human traffickers exploit in order to use hotels as conduits for trafficking in human beings (THB).\\ud Design/methodology/approach: Using the MAVUS framework of sector vulnerability analysis, the study adopted a qualitative approach employing environmental scanning and semi-structured key stakeholder interviews in three European countries: UK, Finland and Romania.\\ud Findings: The study identifies the types of THB occurr...

Interventional radiology has seen rapid growth in cardiology and represents an alternative to hazardous surgery. Recently there has been a substantial growth in the number of procedures being performed and interventional cardiology (IC) procedures are the most common interventional procedures in Europe. Advances in imaging technology have facilitated the development of increasingly complex radiological IC equipment. Currently, the technology is developing at a rate ahead of supporting research, equipment standards and a regulatory framework. International standards play a key role in the design, manufacture and performance of radiological IC equipment. A survey of 12 IC systems (15 imaging chains) was conducted in Irish hospitals. The aim of the study was to assess the imbalance between rapidly advancing technology and existing standards and to propose recommendations for new IC equipment standards. The results demonstrate the need for definitive equipment requirements and standardisation in the design, manufacture, acceptance and maintenance of IC equipment. (authors)

Floor response spectra for dynamic response of subsystem such as equipment, or piping in nuclear power plant are usually generated without considering dynamic interaction between main structure and subsystem. Since the dynamic structural response generally has the narrow-banded shapes, the resulting floor response spectra developed for various locations in the structure usually have high spectral peak amplitudes in the narrow frequency bands corresponding to the natural frequencies of the structural system. The application of such spectra for design of subsystems often leads to excessive design conservatisms, especially when the equipment frequency and structure are at resonance condition. Thus, in order to provide a rational and realistic design input for dynamic analysis and design of equipment, dynamic equipment-structure interaction (ESI) should be considered in developing equipment response spectrum which is particularly important for equipment at the resonance condition. Many analytical methods have been proposed in the past for developing equipment response spectra considering ESI. However, most of these methods have not been adapted to the practical applications because of either the complexities or the lack of rigorousness of the methods. At one hand, mass ratio among the equipment and structure was used as an important parameter to obtain equipment response spectra. Similarly, Tseng has also proposed the analytical method for developing equipment response spectra using mass ratio in the frequency domain. This method is analytically rigorous and can be easily validated. It is based on the dynamic substructuring method as applied to the dynamic soil-structure interaction (SSI) analysis, and can relatively easily be implemented for practical applications without to change the current dynamic analysis and design practice for subsystems. The equipment response spectra derived in this study are also based on Tseng's proposed method

This article documents the methods applied in production control technics specifically focused on commonly used parameter OEE (Overall Equipment Effectiveness). The indicators of extensive and intensive use of equipment are considered. Their appointment this is comparison in the same type of production within the industry and comparison of single-type and / or different types of equipment in terms of capacity. However, it is shown that there is no possibility of revealing the reasons for the machine’s operation: productive / unproductive, with disturbances. Therefore, in the article reveals the approaches to calculating the indicator characterizing the direct operation of the equipment. The Machine Load coefficient is approaching closely to the indicator of the efficiency of the use of equipment. Methods analysis is proceeded through the historically applied techniques such as “Stopwatch” and “Motion” studies. Was performed the analysis of the efficiency index of OEE equipment using the comparable indexes performance of equipment in the Russian practice. An important indicator of OEE contains three components. The meaning of each of them reflects historically applicable indicators. The value of the availability of equipment indicator is close to the value of the equipment extensibility index. The value of the indicator of the efficiency of work can be compared with the characteristic of the capacity of the equipment and the indicator of the quality level can meet the requirements for compliance with the manufacturing technology. Shown that the sum of the values of the coefficient of “Availability” of the equipment and the value of the “Factor of compaction of working hours” are one. As well as the total value of the indicator “level of quality” and the coefficient of marriage given in the result unit. The measurability of the indicators makes it possible to make a prediction about efficiency of the equipment.

Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

Full Text Available The ranges and abundances of species that depend on freshwater habitats are declining worldwide. Efforts to counteract those trends are often hampered by a lack of information about species distribution and conservation status and are often strongly biased toward a few well-studied groups. We identified the 3,906 vascular plants, macroinvertebrates, and vertebrates native to California, USA, that depend on fresh water for at least one stage of their life history. We evaluated the conservation status for these taxa using existing government and non-governmental organization assessments (e.g., endangered species act, NatureServe, created a spatial database of locality observations or distribution information from ~400 data sources, and mapped patterns of richness, endemism, and vulnerability. Although nearly half of all taxa with conservation status (n = 1,939 are vulnerable to extinction, only 114 (6% of those vulnerable taxa have a legal mandate for protection in the form of formal inclusion on a state or federal endangered species list. Endemic taxa are at greater risk than non-endemics, with 90% of the 927 endemic taxa vulnerable to extinction. Records with spatial data were available for a total of 2,276 species (61%. The patterns of species richness differ depending on the taxonomic group analyzed, but are similar across taxonomic level. No particular taxonomic group represents an umbrella for all species, but hotspots of high richness for listed species cover 40% of the hotspots for all other species and 58% of the hotspots for vulnerable freshwater species. By mapping freshwater species hotspots we show locations that represent the top priority for conservation action in the state. This study identifies opportunities to fill gaps in the evaluation of conservation status for freshwater taxa in California, to address the lack of occurrence information for nearly 40% of freshwater taxa and nearly 40% of watersheds in the state, and to

According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools warm air generated by the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat from the rack of information technology equipment.

Pressure equipment constitutes a significant investment in capital and a major proportion of potential high-risk plant in many operations and this is particularly so in an alumina refinery. In many jurisdictions pressure equipment is also subject to statutory regulation that imposes obligations on Owners of the equipment with respect to workplace safety. Most modern technical standards and industry codes of practice employ a risk-based approach to support better decision making with respect to pressure equipment. For a management system to be effective it must demonstrate that risk is being managed within acceptable limits.

This report is part of the scientific basis for the management plan for the North Sea and Skagerrak. The report focuses on the vulnerability of particularly valuable areas to petroleum activities, maritime transport, fisheries, land-based and coastal activities and long-range transboundary pollution. A working group with representatives from many different government agencies, headed by the Institute of Marine Research and the Directorate for Nature Management, has been responsible for drawing up the present report on behalf of the Expert Group for the North Sea and Skagerrak. The present report considers the 12 areas that were identified as particularly valuable during an earlier stage of the management plan process on the environment, natural resources and pollution. There are nine areas along the coast and three open sea areas in the North Sea that were identified according to the same predefined criteria as used for the management plans for the Barents Sea: Lofoten area and the Norwegian Sea. The most important criteria for particularly valuable areas are importance for biological production and importance for biodiversity.(Author)

This report is part of the scientific basis for the management plan for the North Sea and Skagerrak. The report focuses on the vulnerability of particularly valuable areas to petroleum activities, maritime transport, fisheries, land-based and coastal activities and long-range transboundary pollution. A working group with representatives from many different government agencies, headed by the Institute of Marine Research and the Directorate for Nature Management, has been responsible for drawing up the present report on behalf of the Expert Group for the North Sea and Skagerrak. The present report considers the 12 areas that were identified as particularly valuable during an earlier stage of the management plan process on the environment, natural resources and pollution. There are nine areas along the coast and three open sea areas in the North Sea that were identified according to the same predefined criteria as used for the management plans for the Barents Sea: Lofoten area and the Norwegian Sea. The most important criteria for particularly valuable areas are importance for biological production and importance for biodiversity.(Author)

Animal husbandry is a dominant and traditional source of livelihood and income in the Qinghai-Tibetan Plateau. The Qinghai-Tibetan Plateau is the third largest snow covered area in China and is one of the main snow disaster regions in the world. It is thus imperative to urgently address the issue of vulnerability of the animal husbandry sector to snow disasters for disaster mitigation and adaptation under growing risk of these disasters as a result of future climate change. However, there is very few literature reported on the vulnerability of animal husbandry in the Qinghai-Tibetan Plateau. This assessment aims at identifyingvulnerability of animal husbandry at spatial scale and to identify the reasons for vulnerability for adaptive planning and disaster mitigation. First, historical snow disaster characteristics have been analyzed and used for the spatial weight for vulnerability assessment. Second, indicator-based vulnerability assessment model and indicator system have been established. We combined risk of snow hazard, sensitivity of livestock to disaster, physical exposure to disaster, and community capacity to adapt to snow disaster in an integrated vulnerability index. Lastly, vulnerability of animal husbandry to snow disaster on the Qinghai-Tibetan Plateau has been evaluated. Results indicate that high vulnerabilities are mainly concentrated in the eastern and central plateau and that vulnerability decreases gradually from the east to the west. Due to global warming, the vulnerability trend has eased to some extent during the last few decades. High livestock density exposure to blizzard-prone regions and shortages of livestock barn and forage are the main reasons of high vulnerability. The conclusion emphasizes the important role of the local government and community to help local pastoralists for reducing vulnerability to snow disaster and frozen hazard. The approaches presented in this paper can be used for snow disaster mitigation, resilience

Full text: During the 1990s, the IAEA Department of Safeguards began a transition from analog to digital equipment. This included surveillance equipment, seals, NDA measurement systems, and other instruments. The transition to digital equipment was intended to facilitate compatibility between and integration of instruments, remote communication of data, improved data storage, and modernization. Many of the instruments are designed to operate on battery power during loss of facility power, and therefore, are designed to consume minimal power. In 2000, the IAEA experienced a number of failures in digital image surveillance (DIS) equipment. A study of the performance data revealed that the failures occurred in 'high risk' environments where the systems were exposed to neutrons. As a supporter of IAEA equipment development and implementation, the U.S. Support Program worked with the IAEA, the equipment designer, and the equipment manufacturer in special meetings on DIS to determine the cause of the failures. It was as a result of these meetings that single event upset (SEU) was determined to be the root cause of the failures. The meeting participants also identified a list of actions to improve the reliability of DIS systems. As a result of the DIS meetings and the identified actions, the U.S. Support Program approved a request from the IAEA and established Task E.125, 'Remote Monitoring and Unattended Digital Surveillance Systems.' This task is an umbrella task intended to provide a mechanism for response to IAEA needs related to improving the reliability of unattended, remote monitoring and DIS equipment. Subtasks approved under this task include: E.125.1, 'SDIS Software Consolidation and DCM-14 Audit' - This subtask involves the consolidation of a number of individual upgrades to the SDIS and review of the DCM-14 software. As the sponsor of the design of the DCM-14 by Dr. Neumann, the German Support Program is also a participant in this subtask; E.125.2, 'DIS

is reclosed after the fault is cleared, the reclosure will probably be successful since no permanent conducting path for current exists. However...successive EMP-induced faults may cause reclosing circuit breakers and reclosers to lock out. 2. Lock out of reclosers and reclosing circuit breakers...Most distribution lines are protected by some sort of device that recloses the line after a fault is cleared. All such devices have a common

The susceptibility of a stereo amplifier to damage from a spectrum of lengths of graphite fibers was calculated. A simple analysis was developed by which such calculations can be based on test results with fibers of uniform lengths. A statistical analysis was applied for the conversation of data for various logical failure criteria.

Two recent investigations of climate-change vulnerability for 19 terrestrial, aquatic, riparian, and coastal ecosystems of the southeastern United States have identified a number of important considerations, including potential for changes in hydrology, disturbance regimes, and interspecies interactions. Complementary approaches using geospatial analysis and literature synthesis integrated information on ecosystem biogeography and biodiversity, climate projections, vegetation dynamics, soil and water characteristics, anthropogenic threats, conservation status, sea-level rise, and coastal flooding impacts. Across a diverse set of ecosystems—ranging in size from dozens of square meters to thousands of square kilometers—quantitative and qualitative assessments identified types of climate-change exposure, evaluated sensitivity, and explored potential adaptive capacity. These analyses highlighted key gaps in scientific understanding and suggested priorities for future research. Together, these studies help create a foundation for ecosystem-level analysis of climate-change vulnerability to support effective biodiversity conservation in the southeastern United States.

Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

Full Text Available Over the past century, open pit mines have steadily increased their production rate by using larger equipments which requireintensive capital investment. Low commodity prices have forced companies to decrease their unit cost by improving productivity. Oneway to improve productivity is to utilize equipment as effectively as possible. Therefore, the accurate estimation of equipmenteffectiveness is very important so that it can be increased. Overall Equipment Effectiveness (OEE is a well-known measurementmethod, which combines availability, performance and quality, for the evaluation of equipment effectiveness in manufacturing industry.However, there isn’t any study in literature about how to use this metric for mining equipments such as shovel, truck, drilling machineetc. This paper will discuss the application of OEE to measure effectiveness of mining equipment. It identifies causes of time losses forshovel and truck operations and introduces procedure to record time losses. The procedure to estimate OEE of shovels and trucks hasalso been presented via numerical example.

Electromechanical equipment is widely used. It is used in industrial enterprises, in the spheres of public services, in everyday life, etc. Maintenance servicing of electromechanical equipment is an important part of its life cycle. High-quality and timely service can extend the life of the electromechanical equipment. The creation of special systems that simplify the process of servicing electromechanical equipment is an urgent task. Such systems can shorten the time for maintenance of electrical equipment, and, therefore, reduce the cost of maintenance in general. This article presents an analysis of information on the operation of service services for maintenance and repair of electromechanical equipment, identifies the list of services, and estimates the time required to perform basic service operations. The structure of the augmented reality system is presented, the ways of interaction of the augmented reality system with the automated control systems working at the enterprise are presented.

The availability and optimal utilization of medical equipment is important for improving the quality of health services. Significant investments are made for the purchase, maintenance and repair of medical equipment. Inadequate management of these equipment will result in financial losses and deprive the public of the intended benefits. This analysis is based on the conceptual framework drawn from the WHO recommended- lifecycle of medical equipment. (1) To identify the problems in different stages of the life cycle. (2) To assess its financial implications and effect on service delivery. Analysis of secondary data from the latest Comptroller and Auditor General (CAG) Reports for the states in India. The study variables were category of equipment, financial implications and problems in the stages of life cycle. Calculation of proportions. A total of forty instances mentioning problems in the first phase of the life cycle of medical equipment were noted in 12 state reports. The equipment from the radiology department (15), equipment in the wards (5), laboratory (3) and operation theatres (4) were the ones most frequently implicated. In a majority of cases the financial implications amounted to twenty-five lakhs. The financial implications were in the form of extra expenditure, unfruitful expenditure or locking of funds. In 25 cases the equipment could not be put to use because of non-availability of trained staff and inadequate infrastructural support. Careful procurement, incoming inspection, successful installation and synchronization of qualified trained staff and infrastructural support will ensure timely onset of use of the equipment.

Most European assessments of climate change impacts have been carried out on sectors and ecosystems, providing a narrow understanding of what climate change really means for society. Furthermore, the main focus has been on technological adaptations, with less attention paid to the process of climate change adaptation. In this article, we present and analyze findings from recent studies on climate change impacts, vulnerability, and adaptation in Norway, with the aim of identifying the wider social impacts of climate change. Three main lessons can be drawn. First, the potential thresholds and indirect effects may be more important than the direct, sectoral effects. Second, highly sensitive sectors, regions, and communities combine with differential social vulnerability to create both winners and losers. Third, high national levels of adaptive capacity mask the barriers and constraints to adaptation, particularly among those who are most vulnerable to climate change. Based on these results, we question complacency in Norway and other European countries regarding climate change impacts and adaptation. We argue that greater attention needs to be placed on the social context of climate change impacts and on the processes shaping vulnerability and adaptation

Extreme heat events pose a risk to the health of all individuals, especially the elderly and the chronically ill, and are associated with an increased demand for healthcare services. In order to address this problem, policy makers' need information about temperatures above which mortality and morbidity of the exposed population is likely to increase, where the vulnerable groups in the community are located, and how the risks from extreme heat events are likely to change in the future. This study identified threshold temperatures for all Australian capital cities, developed a spatial index of population vulnerability, and used climate model output to predict changes in the number of days exceeding temperature thresholds in the future, as well as changes in risk related to changes in urban density and an ageing population. The study has shown that daily maximum and minimum temperatures from the Bureau of Meteorology forecasts can be used to calculate temperature thresholds for heat alert days. The key risk factors related to adverse health outcomes were found to be areas with intense urban heat islands, areas with higher proportions of older people, and areas with ethnic communities. Maps of spatial vulnerability have been developed to provide information to assist emergency managers, healthcare professionals, and ancillary services develop heatwave preparedness plans at a local scale that target vulnerable groups and address heat-related health risks. The numbers of days exceeding current heat thresholds are predicted to increase over the next 20 to 40 years in all Australian capital cities.

The objective of this paper is to provide a systematic view on the problem of vulnerability and risk analysis of critical infrastructures. Reflections are made on the inherent complexities of these systems, related challenges are identified and possible ways forward for their analysis and management are indicated. Specifically: the framework of vulnerability and risk analysis is examined in relation to its application for the protection and resilience of critical infrastructures; it is argued that the complexity of these systems is a challenging characteristic, which calls for the integration of different modeling perspectives and new approaches of analysis; examples of are given in relation to the Internet and, particularly, the electric power grid, as representative of critical infrastructures and the associated complexity; the integration of different types of analyses and methods of system modeling is put forward for capturing the inherent structural and dynamic complexities of critical infrastructures and eventually evaluating their vulnerability and risk characteristics, so that decisions on protections and resilience actions can be taken with the required confidence. - Highlights: • The problem of the protection and resilience of CIs is the focus of the work. • The vulnerability and risk analysis framework for this is critically examined. • The complexity of CIs is presented as a challenge for system modeling and analysis. • The integration of different modeling perspectives of analysis is put forward as a solution. • The extension of the analysis framework to new methods for dealing with surprises and black swans is advocated.

Full Text Available Vulnerability mapping reveals areas that are likely to be at greater risk of climate-related disasters in the future. Through integration of climate, biophysical, and socioeconomic data in an overall vulnerability framework, so-called “hotspots” of vulnerability can be identified. These maps can be used as an aid to targeting adaptation and disaster risk management interventions. This paper reviews vulnerability mapping efforts in West Africa conducted under the USAID-funded African and Latin American Resilience to Climate Change (ARCC project. The focus is on the integration of remotely sensed and socioeconomic data. Data inputs included a range of sensor data (e.g., MODIS NDVI, Landsat, SRTM elevation, DMSP-OLS night-time lights as well as high-resolution poverty, conflict, and infrastructure data. Two basic methods were used, one in which each layer was transformed into standardized indicators in an additive approach, and another in which remote sensing data were used to contextualize the results of composite indicators. We assess the benefits and challenges of data integration, and the lessons learned from these mapping exercises.

Full Text Available Aquaculture now supplies half of the fish consumed directly by humans. We evaluate whether aquaculture, given current patterns of production and distribution, supports the needs of poor and food-insecure populations throughout the world. We begin by identifying 41 seafood-reliant nutritionally vulnerable nations (NVNs, and ask whether aquaculture meets human nutritional demand directly via domestic production or trade, or indirectly via purchase of nutritionally rich dietary substitutes. We find that a limited number of NVNs have domestically farmed seafood, and of those, only specific aquaculture approaches (e.g., freshwater in some locations have the potential to benefit nutritionally vulnerable populations. While assessment of aquaculture's direct contribution via trade is constrained by data limitations, we find that it is unlikely to contribute substantially to human nutrition in vulnerable groups, as most exported aquaculture consists of high-value species for international markets. We also determine that subpopulations who benefit from aquaculture profits are likely not the same subpopulations who are nutritionally vulnerable, and more research is needed to understand the impacts of aquaculture income gains. Finally, we discuss the relationship of aquaculture to existing trends in capture fisheries in NVNs, and suggest strategies to create lasting solutions to nutritional security, without exacerbating existing challenges in access to food and land resources.

Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.

This presentation recommends that an environmental impact assessment should be made ahead of any major action plan in the environment. The final document should point out to the authorities and public that expertise has been systematised in order to predict the effects of an action plan on the environment. This should be done for different scenarios and time scales. A useful tool for an environmental impact assessment is GIS, Geographic Information Systems. It can be used to identify areas and ecosystems that are vulnerable to radioactive contamination. To predict the radiation dose to humans and biota, a vulnerability assessment considers population density, land use, economic resources and the chemical and biological pathways of radionuclides in different ecosystems. Supplemented with knowledge of consumption and dietary habits a vulnerability assessment can be used to identify critical groups and to calculate doses to these groups. For ecosystems, vulnerability can be quantified by using critical loads for radioactive contamination or flux of radionuclides from an area. One criterion for critical load can be that intervention limits for food products should not be exceeded. If the critical load is low, this indicates a high vulnerability. The flux from an area can also identifyvulnerability and it can be used to calculate collective dose. The vulnerability approach is a methodology that can be used to select areas that are suitable for treatment, transport and disposal of radioactive waste

Full Text Available In recent times, disasters and risk management have gained significant attention, especially with increasing awareness of the risks and increasing impact of natural and other hazards especially in the developing world. Vulnerability, the potential for loss of life or property from disaster, has biophysical or social dimensions. Social vulnerability relates to societal attributes which has negative impacts on disaster outcomes. This study sought to develop a spatially explicit index of social vulnerability, thus addressing the dearth of research in this area in sub-Saharan Africa. Nineteen variables were identified covering various aspects. Descriptive analysis of these variables revealed high heterogeneity across the South West region of Nigeria for both the state and the local government areas (LGAs. Feature identification using correlation analysis identified six important variables. Factor analysis identified two dimensions, namely accessibility and socioeconomic conditions, from this subset. A social vulnerability index (SoVI showed that Ondo and Ekiti have more vulnerable LGAs than other states in the region. About 50% of the LGAs in Osun and Ogun have a relatively low social vulnerability. Distribution of the SoVI shows that there are great differences within states as well as across regions. Scores of population density, disability and poverty have a high margin of error in relation to mean state scores. The study showed that with a geographical information system there are opportunities to model social vulnerability and monitor its evolution and dynamics across the continent.

This paper presents a methodology to measure vulnerability to asset-poverty. Using repeated cross-section data, age cohort decomposition techniques focusing on second-order moments can be used to identify and estimate the variance of shocks on assets and, therefore, the probability of being poor in the future. Estimates from the Ghana Living Standard Surveys show that expected asset-poverty is a reliable proxy for expected consumption-poverty. Applying the methodology to nine Demographic Heal...

The identification of the most vulnerable points on a given structure to be struck by lightning is an important issue on the design of areliable lightning protection system. Traditionally, these lightning strike points are identified using the rolling sphere method, through anempirical correlation with the prospective peak return stroke current. However, field observations in Kuala Lumpur and Singapore haveshown that the points where lightning flashes strike buildings also depend on the heigh...

Full Text Available Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i the rationality of non-structural road network vulnerability, (ii the metrics for negative consequences accounting for variant road conditions, and (iii the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for "emotionally hurt" of topological road network.

This study systematically identifies, characterizes, and critically evaluates community-level climate change vulnerability assessments published over the last 25 years (n = 274). We find that while the field has advanced considerably in terms of conceptual framing and methodological approaches, key shortcomings remain in how vulnerability is being studied at the community-level. We argue that vulnerability research needs to more critically engage with the following: methods for evaluating future vulnerability, the relevance of vulnerability research for decision-making, interdependencies between social and ecological systems, attention to researcher / subject power dynamics, critical interpretation of key terms, and consideration of the potentially positive opportunities presented by a changing climate. Addressing these research needs is necessary for generating knowledge that supports climate-affected communities in navigating the challenges and opportunities ahead.

Full Text Available This paper investigates the valuation of vulnerable European options considering the market prices of common systematic jump risks under regime-switching jump-diffusion models. The way of regime-switching Esscher transform is adopted to identify an equivalent martingale measure for pricing vulnerable European options. Explicit analytical pricing formulae for vulnerable European options are derived by risk-neutral pricing theory. For comparison, the other two cases are also considered separately. The first case considers all jump risks as unsystematic risks while the second one assumes all jumps risks to be systematic risks. Numerical examples for the valuation of vulnerable European options are provided to illustrate our results and indicate the influence of the market prices of jump risks on the valuation of vulnerable European options.

This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer

Borderline personality disorder and vulnerability are difficult to assess and are rather elusive to define. A case study material is presented from a cognitive analytical model. An attempt of the dominant features of cognitive analytical therapy and discussion of vulnerability in relation to personality disorder is provided.

Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate. The countries of the Greater Horn of Africa are particularly vulnerable to drought, exacerbated by widespread poverty and dependence on rainfed agriculture. Even with normal rainfall, the region does not produce enough food to ...

vulnerability among pastoralist communities in Mandera and Turkana in Northern Kenya, led by the Kenyan NGO ... to understand how people have experienced droughts and other ... norms and gender roles may make them more or less vulnerable, ... and see direct impacts on the resources they depend on for their.

Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...

Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…

Apr 21, 2016 ... Much of this biodiversity is highly vulnerable to climate change. ... an astonishing range of life forms found nowhere else on the planet. ... As well as improving information on climate change vulnerabilities, ... They also note negative effects on traditional knowledge, which is seen as losing its sacred power.

The structural method for penetration test generation and vulnerability simulation for infrastructure of telecommunication hardwaresoftware information cybernetic systems (CS), focused to protect against unauthorized access the services defined in the system specification by means of penetrating through legal interfaces of component interaction, which have vulnerabilities, is proposed. A protection service infrastructure is created with cybersystem and maintains it during the life cycle, serv...

textabstractRupture of vulnerable plaques is the main cause of acute coronary syndrome and myocardial infarction. Identification of vulnerable plaques is therefore essential to enable the development of treatment modalities to stabilize such plaques. Several diagnostic methods are currently tested

Volume I of this report presents a summary of DOE's complex-wide review of its low-level waste management system, including the assessment scope and methodology, site-specific and complex-wide vulnerabilities, and DOE's conclusions and recommendations. Volume II presents a more detailed discussion of the assessment methodology and evaluation instruments developed by the Assessment Working Group for identifying site-specific vulnerabilities, categorizing and classifying vulnerabilities, and identifying and analyzing complex-wide vulnerabilities. Attachments A and B of this volume contain, respectively, the Site Evaluation Survey and the Vulnerability Assessment Form used in those processes. Volume III contains the site-specific assessment reports for the 36 sites (38 facilities) assessed in the complex-wide review from which the complex-wide vulnerabilities were drawn

Climate change vulnerability depends upon various factors and differs between places, sectors and communities. People in developing countries whose subsistence livelihood depends upon agriculture and livestock are identified as particularly vulnerable. Nepal, where the majority of people are in a mixed agro-livestock system, is identified as the world's fourth most vulnerable country to climate change. However, there are few studies on how vulnerable mixed agro-livestock smallholders are and how their vulnerability differs across different ecological regions. This study aims to test two vulnerability assessment indices, livelihood vulnerability index (LVI) and IPCC vulnerability index (VI-IPCC), around the Gandaki river basin of Nepal. A total of 543 households practicing mixed agro-livestock were surveyed from three districts (Dhading, Syangja and Kapilvastu) representing the mountain, mid-hill and lowland altitudinal belts respectively. Data on socio-demographics, livelihoods, social networks, health, food and water security, natural disasters and climate variability were collected. Both indices differed across the three districts, with mixed agro-livestock smallholders of Dhading district found to be the most vulnerable and that of Syangja least vulnerable. This vulnerability index approach may be used to monitor rural vulnerability and/or evaluate potential program/policy effectiveness in poor countries like Nepal. The present findings are intended to help in designing intervention strategies to reduce vulnerability of mixed agro-livestock smallholders and other rural people in developing countries to climate change.

Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

The purpose of this document is to list the Interim Stabilization equipment drawings that are classified as Essential or Support drawings. Essential Drawings are those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment. [CHG 2000a]. Support Drawings are those drawings identified by the facility staff that further describe the design details of structures, systems or components shown on essential drawings. [CHG 2000a

The purpose of this document is to list the Interim Stabilization equipment drawings that are classified as Essential or Support drawings. Essential Drawings: Those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment. Support Drawings: Those drawings identified by the facility staff that further describe the design details of structures, systems or components shown on essential drawings

According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools air utilized by the rack of information technology equipment to cool the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat generated by the rack of information technology equipment.

Full Text Available An urban landslide vulnerability assessment methodology is proposed with major focus on considering urban social and economic aspects. The proposed methodology was developed based on the landslide susceptibility maps that Korean Forest Service utilizes to identify landslide source areas. Frist, debris flows are propagated to urban areas from such source areas by Flow-R (flow path assessment of gravitational hazards at a regional scale, and then urban vulnerability is assessed by two categories: physical and socioeconomic aspect. The physical vulnerability is related to buildings that can be impacted by a landslide event. This study considered two popular building structure types, reinforced-concrete frame and nonreinforced-concrete frame, to assess the physical vulnerability. The socioeconomic vulnerability is considered a function of the resistant levels of the vulnerable people, trigger factor of secondary damage, and preparedness level of the local government. An index-based model is developed to evaluate the life and indirect damage under landslide as well as the resilience ability against disasters. To illustrate the validity of the proposed methodology, physical and socioeconomic vulnerability levels are analyzed for Seoul, Korea, using the suggested approach. The general trend found in this study indicates that the higher population density areas under a weaker fiscal condition that are located at the downstream of mountainous areas are more vulnerable than the areas in opposite conditions.

Dealing with large quantities of flammable and explosive materials, usually at high-pressure high-temperature conditions, makes process plants very vulnerable to cascading effects compared with other infrastructures. The combination of the extremely low frequency of cascading effects and the high complexity and interdependencies of process plants makes risk assessment and vulnerability analysis of process plants very challenging in the context of such events. In the present study, cascading effects were represented as a directed graph; accordingly, the efficacy of a set of graph metrics and measurements was examined in both unit and plant-wide vulnerability analysis of process plants. We demonstrated that vertex-level closeness and betweenness can be used in the unit vulnerability analysis of process plants for the identification of critical units within a process plant. Furthermore, the graph-level closeness metric can be used in the plant-wide vulnerability analysis for the identification of the most vulnerable plant layout with respect to the escalation of cascading effects. Furthermore, the results from the application of the graph metrics have been verified using a Bayesian network methodology. - Highlights: • Graph metrics can effectively be employed to identifyvulnerable units and layouts in process plants. • Units with larger vertex-level closeness result in more probable and severe cascading effects. • Units with larger vertex-level betweenness contribute more to the escalation of cascading effects. • Layouts with larger graph-level closeness are more vulnerable to the escalation of cascading effects

Drought as a slow-onset phenomenon inflicts important losses to agriculture where the degree of vulnerability depends not only on physical variables such as precipitation and temperature, but also on societal preparedness. While the scopes of physical and social vulnerability are very different in nature, studies distinguishing these two aspects have been lacking. In this study we address the physical and social aspects of drought vulnerability of maize (CDVIphy and CDVIsoc) in Sub-Saharan Africa (SSA). To quantify vulnerability, we applied a probabilistic framework combining a Drought Exposure Index (DEI) with a physical or social Crop Failure Index, CFIphy or CFIsoc, respectively. DEI was derived from the exceedance probability of precipitation. Maize yields, simulated using the Environmental Policy Integrated Climate (EPIC) model, were used to build CFIphy, whereas the residual of simulated and FAO recorded yields were used to construct CFIsoc. The results showed that southern and partially central Africa are more vulnerable to physical drought as compared to other regions. Central and western Africa, however, are socially highly vulnerable. Comparison of CDVIphy and CDVIsoc revealed that societal factors cause more vulnerability than physical variables in almost all SSA countries except Nigeria and South Africa. We conclude that quantification of both drought vulnerabilities help a better characterization of droughts and identify regions where more investments in drought preparedness are required.

measure of validation. Our indices classified species identified as being in need of conservation by the state of Missouri as highly vulnerable. The distribution of vulnerable species in Missouri showed consistent patterns between indices, with the more forest-dominated, groundwater fed streams in the Ozark subregion generally having higher numbers and proportions of vulnerable species per site than subregions that were agriculturally dominated with more overland flow. These results suggest that both indices will identify similar habitats as conservation action targets despite discrepancies in the classification of vulnerable species. Our vulnerability assessment provides a framework that can be refined and used in other regions.

Future climate change impacts on humans will be determined by the convergence of evolving physical climate and socioeconomic systems. Of particular concern is the intersection of extreme events and vulnerable populations. Rural areas of the Northeastern United States have experienced increased temperature and precipitation extremes, especially over the past three decades, and face unique challenges due to their physical isolation, natural resources dependent economies, and high poverty rates. To explore the impacts of future extreme events on vulnerable, rural populations in the Northeast, we project extreme events and vulnerability indicators to identify where changes in extreme events and vulnerable populations coincide. Specifically, we analyze future (2046-2075) maximum annual daily temperature, minimum annual daily temperature, maximum annual daily precipitation, and maximum consecutive dry day length for Representative Concentration Pathways (RCP) 4.5 and 8.5 using four global climate models (GCM) and a gridded observational dataset. We then overlay those projections with estimates of county-level population and relative income for 2060 to calculate changes in person-events from historical (1976-2005), with a focus on Northeast counties that have less than 250,000 people and are in the bottom income quartile. We find that across the rural Northeast for RCP4.5, heat person-events per year increase tenfold, far exceeding decreases in cold person-events and relatively small changes in precipitation and drought person-events. Counties in the bottom income quartile have historically (1976-2005) experienced a disproportionate number of heat events, and counties in the bottom two income quartiles are projected to experience a greater heat event increase by 2046-2075 than counties in the top two income quartiles. We further explore the relative contributions of event frequency, population, and income changes to the total and geographic distribution of climate change

Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption

The period following discharge from the hospital is one of heightened vulnerability. Discharge instructions serve as a guide during this transition. Yet, clinicians receive little feedback on the quality of this document that ties into the patients' experience. We reviewed the issues voiced by discharged patients via a call-back program and compared them to the discharge instructions they had received. At our institution, patients receive an automated call forty-eight hours following discharge inquiring about progress. If indicated by the response to the call, they are directed to a nurse who assists with problem solving. We reviewed the nursing documentation of these encounters for a period of nine months. The issues voiced were grouped into five categories: communication, medications, durable medical equipment/therapies, follow up and new or ongoing symptoms. The discharge instructions given to each patient were reviewed. We retrieved data on the number of discharges from each specialty from the hospital over the same period. A total of 592 patients voiced 685 issues. The numbers of patients discharged from medical or surgical services identified as having issues via the call-back line paralleled the proportions discharged from medical and surgical services from the hospital during the same period. Nearly a quarter of the issues discussed had been addressed in the discharge instructions. The most common category of issues was related to communication deficits including missing or incomplete information which made it difficult for the patient to enact or understand the plan of care. Medication prescription related issues were the next most common. Resource barriers and questions surrounding medications were often unaddressed. Post discharge issues affect patients discharged from all services equally. Data from call back programs may provide actionable targets for improvement, identify the inpatient team's 'blind spots' and be used to provide feedback to clinicians.

Vulnerability in the power distribution network has been made a current topic because of various factors, from terror attacks to a strained power balance, large breakdowns in the power system in Europe and North America in recent time and an anticipated increase in climate-related challenges in the coming years; all related to the modern society's critical dependence on reliable power supply. Several questions are posed; whether there is a foundation to say that the vulnerability in the power network is increasing because of factors like cuts in staffing, reduced investments and increased exploitation of the capacity in the power systems, or increased average age on the air network. Different development features can indicate that the power network's ability to resist high stress is about to weaken. Examples of this is the slowly increasing trend in the number of non-reported interruptions, as well as an increase in the error frequency for power lines in the distribution network and for distribution transformers. In the pre-study there has not been found enough evidence to give a clear answer to whether the vulnerability in the power network is in fact on the rise. This is mainly due to the lack of good indicators, measuring methods and the foundation for documentation. Suggestions for methodology in order to identify unwanted incidents, estimate the probability and classify consequences for vulnerability analyses of power networks are presented. The methodology is concretised and exemplified in relation to a specific case: Power loss in the southern Norway affecting more than 250 000 people for 8-12 hours. Such a consequence is classified as critical. For four sub areas it has been exemplified which incidents may potentially cause such breaks. A summary is made of the most important challenges related to making vulnerability analyses of power networks. Comprised here are appropriate concepts, definitions, standards and measuring scales as well as data foundation

new methodology and solution methods for vulnerability assessment can help the overall national energy sector to identify and understand the terrorist threats to and vulnerabilities of its critical infrastructure. Moreover, adopted methodology could help national regulators and agencies to develop and implement a vulnerability awareness and education programs for their critical assets to enhance the security and a safe operation of the entire energy infrastructure. New methods can also assist nuclear power plants to develop, validate, and disseminate assessment and surveys of new efficient countermeasures. Consequently, concise description of developed new quantitative method and adapted new methodology for nuclear regulatory vulnerability assessment of nuclear power plants are presented.

Groundwater vulnerability mapping is a practical tool to implement strategies for land-use planning and sustainable socioeconomic development coherent with groundwater protection. The objective of vulnerability mapping is to identify the most vulnerable zones of catchment areas and to provide criteria for protecting the groundwater used for drinking water supply. The delineation of protection zones in fractured aquifers is a challenging task due to the heterogeneity and anisotropy of hydraulic conductivities, which makes difficult prediction of groundwater flow organization and flow velocities. Different methods of intrinsic groundwater vulnerability mapping were applied in the Atemajac-Toluquilla groundwater body, an aquifers system that covers around 1300 km2. The aquifer supplies the 30% of urban water resources of the metropolitan area of Guadalajara (Mexico), where over 4.6 million people reside. Study area is located in a complex neotectonic active volcanic region in the Santiago River Basin (Western Mexico), which influences the aquifer system underneath the city. Previous works have defined the flow dynamics and identified the origin of recharge. In addition, the mixture of fresh groundwater with hydrothermal and polluted waters have been estimated. Two main aquifers compose the multilayer system. The upper aquifer is unconfined and consists of sediments and pyroclastic materials. Recharge of this aquifer comes from rainwater and ascending vertical fluids from the lower aquifer. The lower aquifer consists of fractured basalts of Pliocene age. Formerly, the main water source has been the upper unit, which is a porous and unconsolidated unit, which acts as a semi-isotropic aquifer. Intense groundwater usage has resulted in lowering the water table in the upper aquifer. Therefore, the current groundwater extraction is carried out from the deeper aquifer and underlying bedrock units, where fracture flow predominates. Pollution indicators have been reported in

The coastal zone is of very high importance for human development and human wellbeing. Half of the global urban population lives in the coastal zone, where it has access to both continental and marine ecosystem services and to maritime transport. These urban populations coexist with rural and traditional coastal populations, some of which still possess good traditional ecological knowledge of the coastal ecosystems. Marine biodiversity and favourable environmental conditions sustain fisheries and aquaculture, represent a source of inspiration for humankind and provide numerous opportunities for recreation and tourism. In addition, coastal areas provide nursery functions for juvenile fish and invertebrates, which is important for the fish and crayfish stocks exploited offshore. Located at the interface between marine energy and continental processes, the coastal landscapes are dynamic environments. Nevertheless, the destruction of habitats and the increasing exploitation of the coastal zone represent serious threats to the ecosystems. Moreover, human land use and modifications in the watersheds have strong impacts on the coastal zone primarily by contributing to their pollution and nutrient over-enrichment. Damming and creation of reservoirs upstream also heavily modify the hydrology of the watersheds and often dramatically reduce the delivery of sediments to the coastal zone. In addition to these regional and local anthropogenic impacts, the coastal zone is vulnerable to global change among which sea level rise and climate change are particularly important drivers. Many coastal zones extend along giant faults and subduction zones, which makes them particularly exposed to earthquakes and tsunami hazards. Other forms of natural hazards are caused by hurricanes and cyclones that develop at sea and whose trajectories often hit the coastlines.

In this study, DUPIC powder and pellet fabrication equipment, welding system, QC equipment, and fission gas treatment are developed to fabricate DUPIC fuel at IMEF M6 hot cell. The systems are improved to be suitable for remote operation and maintenance with the manipulator at hot cell. Powder and pellet fabrication equipment have been recently developed. The systems are under performance test to check remote operation and maintenance. Welding chamber and jigs are designed and developed to remotely weld DUPIC fuel rod with manipulators at hot cell. Remote quality control equipment are being tested for analysis and inspection of DUPIC fuel characteristics at hot cell. And trapping characteristics is analyzed for cesium and ruthenium released under oxidation/reduction and sintering processes. The design criteria and process flow diagram of fission gas treatment system are prepared incorporating the experimental results. The fission gas treatment system has been successfully manufactured. (Author). 33 refs., 14 tabs., 91 figs

Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples

Save the Children Foundation (SCF), a nongovernmental organization (NGO), developed the "household food economy analysis" to assess the needs of an area or population facing acute food insecurity. This method considers all of the ways people secure access to food and illustrates the distribution of various food supplies in pie charts that allow comparison of the percentage contribution of each option during a normal year and a "bad" year. Data are gathered through the use of key informants, and the analysis permits identification of ways to support local initiatives and to target assistance. As a result of this work, SCF and another NGO, Helen Keller International, attended a March 1997 expert consultation organized by the UN Food and Agriculture Organization (FAO) to create a workplan for the Food Insecurity and Vulnerability Information and Mapping System (FIVIMS) called for in the World Food Summit Plan of Action. The consultation adopted use of the FAO's food and balance sheet approach, despite its limitations, and determined that indicators should be location- and time-specific as well as 1) simple and reliable, 2) readily available, 3) social and anthropometric, and 4) found at all levels. The consultation also recommended combination of the key informant and the indicator approach to data collection. Finally, the consultation identified appropriate actions that should be accomplished before the 1998 meeting of the FAO's Committee on World Food Security.

In today's societies, the production base made up by the industrial fabric acts as an important link between the climate and its variations and our lifestyle. However, several decades of experience have often enabled us to minimise the impact of the weather and its fluctuations on activities, making the industrial sector out to be purely artificial and protected from climate impacts. Yet climate change leads us to challenge this assumption: if the industrial base is supposed to be impervious to the current climate, is this still the case in a context of climate change? In an attempt to answer this question, the Invulnerable project was launched, led by the Institute for Sustainable Development and International Relations (IDDRI) and bringing together scientific and industrial partners (Meteo-France, IPSL, CERFACS). Observing the availability of scientific resources on climate change, partly resulting from the modeling research coordinated by the IPCC, the idea was to work with industries to identify their vulnerabilities and to use these to define indicators for climatologists. These indicators are not chosen by scientists without consulting industries, but are in fact defined by these industries to ensure they correspond to their needs as closely as possible. The challenge is therefore to bring together scientists and industries and to catalyse a mutual understanding to ensure this discussion results in one or several indicators that are relevant to the activity in question and on which climatologists can work

Full Text Available The evolution of information systems and the growth in the use of the Internet and social networks has caused an explosion in the amount of available data relevant to the activities of the companies. Therefore, the treatment of these available data is vital to support operational, tactical and strategic decisions. This paper aims to present the concept of big data and the main technologies that support the analysis of large data volumes. The potential of big data is explored considering nine sectors of activity, such as financial, retail, healthcare, transports, agriculture, energy, manufacturing, public, and media and entertainment. In addition, the main current opportunities, vulnerabilities and privacy challenges of big data are discussed. It was possible to conclude that despite the potential for using the big data to grow in the previously identified areas, there are still some challenges that need to be considered and mitigated, namely the privacy of information, the existence of qualified human resources to work with Big Data and the promotion of a data-driven organizational culture.

The upgrades or replacement of I and C systems on safety system typically involve digital equipment developed in accordance with non-nuclear standards. However, the use of commercial grade digital equipment could include the vulnerability for software common-mode failure, electromagnetic interference and unanticipated problems. Although guidelines and standards for dedication methods of commercial grade digital equipment are provided, there are some difficulties to apply the methods to commercial grade digital equipment for safety system. This paper focuses on regulatory guidelines and relevant documents for commercial grade digital equipment and presents safety review experiences related to commercial grade digital equipment in safety system. This paper focuses on KINS regulatory guides and relevant documents for dedication of commercial grade digital equipment and presents safety review experiences related to commercial grade digital equipment in safety system. Dedication including critical characteristics is required to use the commercial grade digital equipment on safety system in accordance with KEPIC ENB 6370 and EPRI TR-106439. The dedication process should be controlled in a configuration management process. Appropriate methods, criteria and evaluation result should be provided to verify acceptability of the commercial digital equipment used for safety function

The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

The objective and the scope of this document are to list and briefly describe the major mobile equipment necessary for waste package (WP) Transport and Emplacement in the proposed subsurface nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the equipment are explained and summarized in the individual subsections of this document. The Transport and Emplacement equipment described in this document consists of the following: (1) WP Transporter; (2) Reusable Rail Car; (3) Emplacement Gantry; (4) Gantry Carrier; and (5) Transport Locomotive

The Containment and Surveillance Equipment Compendium contains information sections describing the application and status of seals, optical surveillance systems, and monitors for international safeguards systems. The Compendium is a collection of information on equipment in use (generally by the IAEA) or under development in the US in diverse programs being conducted at numerous facilities under different sponsors. The Compendium establishes a baseline for the status and applications of C/S equipment and is a tool to assist in the planning of future C/S hardware development activities. The Appendix contains design concepts which can be developed to meet future goals

Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively

Two vulnerability analysis techniques, Diversion Path Analysis (DPA) and Matrix Analysis of the Insider Threat (MAIT), were applied by EG and G Idaho, Inc. Safeguards and Security to the same item accountable SNM storage area at INEL. Technical and cost data for each methodology were collected and compared. A recommendation that MAIT be utilized for future vulnerability analyses of item accountable SNM storage and use areas operated by EG and G Idaho for DOE-ID resulted. Unclassified results of the two techniques and MAIT/DPA technical and cost comparisons will be presented which show that MAIT can be used for vulnerability analyses to comply with Department of Energy (DOE) requirements

U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

Full Text Available Resilience research has usually focused on identifying protective factors associated with specific stress conditions (e.g., war, trauma or psychopathologies (e.g., post-traumatic stress disorder. Implicit in this research is the concept that resilience is a global construct, invariant to the unfavorable circumstances or the psychopathologies that may develop (i.e., the mechanisms underlying the resilience of an individual in all cases are expected to be similar. Here we contribute to the understanding of resilience—and its counterpart, vulnerability—by employing an approach that makes use of this invariant quality. We outline two main characteristics that we would expect from indicators of a vulnerable state: that they should appear across disorders regardless of specific circumstances, and that they should appear much before the disorder is evident. Next, we identify two sets of factors that exhibit this pattern of association with psychopathological states. The first was a set of low-level sensory, motor and regulatory irregularities that have been reported across the clinical literature; we suggest that these can serve as behavioral indicators of a vulnerable state. The second was the set of aberrations in network metrics that have been reported in the field of systems neuroscience; we suggest that these can serve as network indicators of a vulnerable state. Finally, we explore how behavioral indicators may be related to network indicators and discuss the clinical and research-related implications of our work.

We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.

Much attention has been paid to thermal environments in Seoul City in South Korea since 2016 when the worst heatwave in 22 years. It is necessary to provide a selective measure by singling out vulnerable regions in advance to cope with the heat wave-related damage. This study aims to analyze and categorize vulnerable regions of thermal environments in the Seoul and analyzes and discusses the factors and risk factors for each type. To do this, this study conducted the following processes: first, based on the analyzed various literature reviews, indices that can evaluate vulnerable regions of thermal environment are collated. The indices were divided into climate exposure index related to temperature, sensitivity index including demographic, social, and economic indices, and adaptation index related to urban environment and climate adaptation policy status. Second, significant variables were derived to evaluate a vulnerable region of thermal environment based on the summarized indices in the above. this study analyzed a relationship between the number of heat-related patients in Seoul and variables that affected the number using multi-variate statistical analysis to derive significant variables. Third, the importance of each variable was calculated quantitatively by integrating the statistical analysis results and analytic hierarchy process (AHP) method. Fourth, a distribution of data for each index was identified based on the selected variables and indices were normalized and overlapped. Fifth, For the climate exposure index, evaluations were conducted as same as the current vulnerability evaluation method by selecting future temperature of Seoul predicted through the representative concentration pathways (RCPs) climate change scenarios as an evaluation variable. The results of this study can be utilized as foundational data to establish a countermeasure against heatwave in Seoul. Although it is limited to control heatwave occurrences itself completely, improvements

Ocean acidification is a global, long-term problem whose ultimate solution requires carbon dioxide reduction at a scope and scale that will take decades to accomplish successfully. Until that is achieved, feasible and locally relevant adaptation and mitigation measures are needed. To help to prioritize societal responses to ocean acidification, we present a spatially explicit, multidisciplinary vulnerability analysis of coastal human communities in the United States. We focus our analysis on shelled mollusc harvests, which are likely to be harmed by ocean acidification. Our results highlight US regions most vulnerable to ocean acidification (and why), important knowledge and information gaps, and opportunities to adapt through local actions. The research illustrates the benefits of integrating natural and social sciences to identify actions and other opportunities while policy, stakeholders and scientists are still in relatively early stages of developing research plans and responses to ocean acidification.

Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

This study tested whether childhood parental emotional abuse and peer emotional bullying serve as antecedents of depression in adolescence and identified the cognitive mechanisms involved in this process. It was hypothesized that the experience of emotional abuse would predict depressive symptoms via development of rumination and negative inferences. A 3-wave longitudinal study was carried out with 998 adolescents (471 girls and 526 boys) between 13 and 17 years of age. Results showed that emotional abuse by parents and peers at Time 1 predicted a worsening of several cognitive vulnerabilities at Time 2. In addition, brooding mediated between the experiences of abuse and the increase of depressive symptoms at Time 3. Thus, findings suggest that the experiences of childhood emotional abuse by parents and peers serve as antecedents to develop a negative cognitive style, vulnerability that, once developed, is a risk factor for the onset of depressive symptoms in adolescence.

automated tools that can assist the programmers in the application development process by detecting weaknesses. Many vulnerabilities are related to web application code that stores references to application state in the generated HTML documents to work around the statelessness of the HTTP protocol....... In this paper, we show that such client-state manipulation vulnerabilities are amenable to tool supported detection. We present a static analysis for the widely used frameworks Java Servlets, JSP, and Struts. Given a web application archive as input, the analysis identifies occurrences of client state...... and infers the information flow between the client state and the shared application state on the server. This makes it possible to check how client-state manipulation performed by malicious users may affect the shared application state and cause leakage or modifications of sensitive information. The warnings...

Identifying, assessing, and mitigating electric power grid vulnerabilities is a growing focus in short-term operational planning of power systems. Through illustrated application, this important guide surveys state-of-the-art methodologies for the assessment and enhancement of power system security in short-term operational planning and real-time operation. The methodologies employ advanced methods from probabilistic theory, data mining, artificial intelligence, and optimization, to provide knowledge-based support for monitoring, control (preventive and corrective), and decision making tasks. Key features: Introduces behavioural recognition in wide-area monitoring and security constrained optimal power flow for intelligent control and protection and optimal grid management. Provides in-depth understanding of risk-based reliability and security assessment, dynamic vulnerability as essment methods, supported by the underpinning mathematics. Develops expertise in mitigation techniques using intelligent protect...

Abstract: Data center equipment location systems include hardware and software to provide information on the location, monitoring, and security of servers and other equipment in equipment racks. The systems provide a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to an equipment rack controller on the equipment rack. The equipment rack controllers link to a central control computer that provides an operator ...

Dieng Volcanic Highland is one of frost disaster prone area which is very unique phenomenon in tropical region. Frost indicated by appearance of frozen dew or ice layer on the ground or vegetation surface due air inversion and cold temperatures during midnight in dry season. Appearance of frost significantly causes plant damage and losses on agricultural land, while the impacts were strongly influenced by level of vulnerability within agricultural communities. This study aims to analyze the impact of frost on agricultural land in Dieng, to identify characteristics of physical, social, economic vulnerability and coping capacity of agricultural communities to frost disaster in Dieng, and to estimate total vulnerability of frost disasters in Dieng through SMCE scenario. Research was conducted in Dieng Village, Wonosobo and Dieng Kulon Village, Banjarnegara. Method to assess vulnerability level is performed by Spatial Multi Criteria Evaluation (SMCE) method using ILWIS software through a combination of physical, social, and economic vulnerability regarding frost hazard, as well as coping capacity of farmers. Data collected by interview within different agricultural plots using questionnaire and in-depth interview method on frost affected agricultural land. Impact of frost mostly causes damage on potato agricultural land than any other types of commodities, such as carrot, leek or cabbage. Losses varies in range of 0 million to 55 million rupiah, at most events in range of 10 million to 15 million rupiah during frost season on July-August-September. Main factors determining vulnerability comes from crop losses, preparedness effort, and type of commodity. Agricultural land dominated by high level physical vulnerability (95.37 percent), high level social vulnerability (70.79 percent), moderate level economic vulnerability (79.23 percent) and moderate level coping capacity (73.18 percent). All five scenarios indicated that level of total vulnerability vary only from

Nowadays the role of FOSS software in scientific research is becoming increasingly important. Besides the important issues of reduced costs for licences, legality and security there are many other reasons that make FOSS software attractive. Firstly, making the code opened is a warranty of quality permitting to thousands of developers around the world to check the code and fix bugs rather than rely on vendors claims. FOSS communities are usually enthusiastic about helping other users for solving problems and expand or customize software (flexibility). Most important for this study, the interoperability allows to combine the user-friendly QGIS with the powerful GRASS-GIS and the richness of statistical methods of R in order to process remote sensing data and to perform geo-statistical analysis in one only environment. This study is focused on the land degradation (i.e. the reduction in the capacity of the land to provide ecosystem goods and services and assure its functions) and in particular on the estimation of the vulnerability levels in order to suggest appropriate policy actions to reduce/halt land degradation impacts, using the above mentioned software. The area investigated is the Basilicata Region (Southern Italy) where large natural areas are mixed with anthropized areas. To identify different levels of vulnerability we adopted the Environmentally Sensitive Areas (ESAs) model, based on the combination of indicators related to soil, climate, vegetation and anthropic stress. Such indicators were estimated by using the following data-sources: - Basilicata Region Geoportal to assess soil vulnerability; - DESERTNET2 project to evaluate potential vegetation vulnerability and climate vulnerability; - NDVI-MODIS satellite time series (2000-2010) with 250m resolution, available as 16-day composite from the NASA LP DAAC to characterize the dynamic component of vegetation; - Agricultural Census data 2010, Corine Land Cover 2006 and morphological information to assess

U.S. Environmental Protection Agency — Certified models meet all ENERGY STAR requirements as listed in the Version 2.0 ENERGY STAR Program Requirements for Imaging Equipment that are effective as of...

Electromagnetic radiation (EMR) emission strength measurements were performed on a suite of passive non-destructive assay (NDA) radiation detection equipment. Data were collected from 9 kHz up to 6 GHz on each of the assembled systems.

Orthopaedists make great use of eponymous equipment, however the origins of these tools are unknown to many users. This history enriches, enlightens, and enhances surgical education, and may inspire modern innovation. We explored the origins of common and eponymous orthopaedic equipment. We selected pieces of equipment named for their inventors and in the broadest use by modern orthopaedists. We do not describe specialized orthopaedic implants and instruments owing to the overwhelming number of these devices. The history of this equipment reflects the coevolution of orthopaedics and battlefield medicine. Additionally, these stories evidence the primacy of elegant design and suggest that innovation is often a process of revision and refinement rather than sudden inspiration. Their history exposes surgical innovators as brilliant, lucky, hardworking, and sometimes odd. These stories amuse, enlighten, and may inspire modern orthopaedists to develop creative solutions of their own. The rich history of the field's eponymous instruments informs an ongoing tradition of innovation in orthopaedics.

In a nuclear power plant, states of each of equipment in the plant are monitored accurately even under such a operation condition that the power is changed. That is, the fundamental idea is based on a model comparison method. A deviation between an output signal upon normal plant state obtained in a forecasting model device and that of the objective equipment in the plant are compared with a predetermined value. The result of the comparison is inputted to an alarm device to alarm the abnormality of the states of the equipment to an operator. The device of the present invention thus constituted can monitor the abnormality of the operation of equipment accurately even under such a condition that a power level fluctuates. As a result, it can remarkably contribute to mitigate operator's monitoring operation under the condition such as during load following operation. (I.S.)

Protected areas are tasked with mitigating impacts to a wide range of invaluable resources. These resources are often subject to a variety of potential natural and anthropogenic impacts that require monitoring efforts and management actions to minimize the degradation of these resources. However, due to insufficient funding and staff, managers often have to prioritize efforts, leaving some resources at higher risk to impact. Attempts to address this issue have resulted in numerous qualitative and semi-quantitative frameworks for prioritization based on resource vulnerability. Here, we add to those methods by modifying an internationally standardized vulnerability framework, quantify both resource vulnerability, susceptibility to human disturbance, and fragility, susceptibility to natural disturbance. This modified framework quantifies impacts through a six-step process: identifying the resource and management objectives, identifying exposure and sensitivity indicators, define scoring criteria for each indicator, collect and compile data, calculate indices, and prioritize sites for mitigations. We applied this methodology to two resource types in Grand Canyon National Park (GRCA): caves and fossil sites. Three hundred sixty-five cave sites and 127 fossil sites in GRCA were used for this analysis. The majority of cave and fossil sites scored moderate to low vulnerability (0-6 out of 10 points) and moderate to low fragility for fossils. The percentage of sites that fell in the high-priority range was 5.5% for fossils and 21.9% for caves. These results are consistent with the known state of these resources and the results present a tool for managers to utilize to prioritize monitoring and management needs.

In order to enhance the reactor availability, several improvements on reactor equipment have been developed: design optimization for stator maintenance replacement in the main alternator; adjustment modification of stator coils in the main alternator for an easier maintenance; improvement of the fuel handling line (pole crane, transfer equipment, loading machine); development of a loose part trapping system in the steam generator secondary circuit. 1 tab

A low level photoneutron detection equipment has been developed. The photoneutrons produced by interaction of 226 Ra gamma quanta and deutron (D) target are detected with n-n discrimination detector made up of 3 He proportional counter array. The D-content information in the target can be obtained from the measured photoneutron counts. The equipment developed is mainly used for nondestructive D-content measurement of D-devices

Under DOE contract, Dalton-Dalton-Newport, Inc. is performing an engineering evaluation of three selected FUSRAP sites in an effort to generate equipment concepts to perform remedial action for retrieval, packaging, storing, and transporting contaminated soil and other debris. Along with this engineering evaluation, an analysis of state and Federal regulations was made which had significant impact on the selected equipment and costs for each remedial action concept

The coupling process of pneumatic and electrical auxiliary lines of a pneumatic control pressure line in a large cell of the reprocessing plant is carried out, together with the coupling process of the connecting flange of the process equipment. The coupling places of the auxiliary lines, such as control or supply lines, are laid in the flange parts of the flanges to be connected. The pipe flange on the frame side remains flush with the connecting flange of the process equipment. (DG) [de

Industry initiatives have been taken to improve procurement practices and commercial dedication programs, formation of procurement engineering groups, emphasis on product quality, and increased engineering involvement in procurement and maintenance of qualified equipment. This poses new challenges for many licensees in terms of resources, product knowledge, and access to information normally held proprietary by equipment suppliers. Alternative approaches to future licensee/Westinghouse relationships which will allow licensees to adapt to the changing environment are discussed. 2 figs

The principal materials, such as the primary equipments of a PWR type steam generator, have a finite service life. Framatome, builder of steam generators and maintenance contractor of Electricite de France has developed a methodology for the maintenance or the replacement of primary equipments. The paper describes the methodology followed by Framatome to identify and localize the wear mode and to treat or repair the component. Four failure modes have been considered: crack propagation, rubbing/vibration wear, neutron irradiation and corrosion propagation under permanent stress. A kinetic modelling of wear propagation has been computerized and validated using mechanical tests on Inconel 600 mockups. These analyses have allow to determine the strategy of repair or replacement of vessel heads for each unit. The method is evaluated taking into account the risk assessment, cost, dosimetry, efficiency and time delay involved. (J.S.). 1 fig., 3 photos

The low activation fusion concept has been applied to the diagnostic equipment in a fusion reactor. The components where fabrication from low activation materials is feasible have been identified. Other systems where higher activation elements are required can have their activation reduced by design approaches which include shielding and operation only in low flux regions of the reactor. Some components will not operate in a high flux so activation is not a major concern. This low activation diagnostic equipment study completes a series of low activation studies where all the components in a fusion power reactor have now been evaluated. It is concluded that a completely low activation fusion reactor is feasible with all components meeting the functional requirements. This provides an environmentally benign energy source with a high confidence level in meeting safety criteria in operation, maintenance and waste disposal

Focus Cities : Reducing the Vulnerability, Poverty and Environmental Load in ... 000 lives in closely constructed houses built right up to the edge of the Rimac River. ... and the Lima Metropolitan Urban Plan will be updated in light of the results.

Saharan African region. ... especially for vulnerable groups. At independence in 1980, Zimbabwe pledged to promote a viable social protection system that would be predicated on the principles of social justice and equality of opportunity.

applied models for groundwater vulnerability assessment mapping. The appraoches .... The overall 'pollution potential' or DRASTIC index is established by applying the formula: DRASTIC Index: ... affected by the structure of the soil surface.

Full Text Available While Syrian nationals may eventually return to their home country, the future for Palestinians from Syria is increasingly uncertain. Meanwhile they are more vulnerable than, and treated worse than, most other refugees from the Syrian conflict.

The U.S. military's increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries...

The cost benefits analysis was the main technique used to evaluate alternative adaptation strategies. .... Figure 7 Different vulnerability levels of households from Lambani and Alice . ...... practices and the maintenance of surface residues.